Clone of . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

192 KiB

Attacking & Securing Active Directory

Table of Contents

Active Directory Technologies Attacking AD
ADFS Hunting Users
AdminSD DCShadow
Advanced Threat Analytics DCSync
Advanced Threat Protection Kerberos Delegation
DACLs AS-REP Roasting
DNS Kebreroasting
Domain Trusts Pass-the-*
Forests Shadow Admin
Group Managed Service Accounts(GMSA) Skeleton Key
Group Policy AD Vulnerabilities(CVEs)
Kerberos Defense Evasion
LDAP Collection
Local Admin Password Solution Credential Attacks
Lync Persistence
MS-SQL Privilege Escalation
NTLM Reconnaissance
Read-Only Domain Controllers Lateral Movement
Red Forest
Service Principal Names
System Center Configuration Manager
Domain Trusts
MS Exchange

Active Directory

Email/Microsoft Exchange

properly sort out

Hardening & Securing Active Directory