📖
Notes
Ctrlk
  • 🙌Welcome!
  • CyberSecurity
    • Penetration Testing
      • ELearnSecurity
      • PortSwigger
      • TryHackMe
        • Main Methodology
          • 1. Reconnaissance
          • 2. Enumeration/Scanning
          • 3. Gaining Access / Exploitation
          • 4. Post Exploitation
            • Privilege Escalation
            • Tools
            • Windows Active Directory
              • Enumeration with Powerview
              • Enumeration with Bloodhound (GUI)
              • Dumping Hashes with mimikatz
              • Golden Ticket Attacks with mimikatz
              • Enumeration with Server Manager
              • Maintaining Access
              • Additional Resources
          • 5. Covering Tracks
          • 6. Reporting
        • Networking Concepts
        • Scripting
        • Web Extensions
      • Miscellaneous
    • Blue Teaming
  • DevOps
    • Infrastructure as a Code (IaC)
    • Orchestration
  • Development
    • Blockchain
    • Backend
    • Database
    • Testing
Powered by GitBook
On this page
  1. CyberSecurity
  2. Penetration Testing
  3. TryHackMe
  4. Main Methodology
  5. 4. Post Exploitation

Windows Active Directory

Enumeration with PowerviewEnumeration with Bloodhound (GUI)Dumping Hashes with mimikatzGolden Ticket Attacks with mimikatzEnumeration with Server ManagerMaintaining AccessAdditional Resources
PreviousSocat - Reverse TCP TunnelNextEnumeration with Powerview

Last updated 2 years ago