Pentesting notes
CtrlK
  • 🏠/home/kabaneridev/.pt-notes
  • πŸ†Certification Preparation
    • βœ…CPTS - Completed
      • 🌐Infrastructure Enumeration
      • πŸ›‘οΈFirewall Evasion
      • πŸ”Vulnerability Assessment
      • πŸ“‚File Transfer Methods
      • 🐚Shells & Payloads
      • πŸ—„οΈDatabase Services
      • πŸ“Network Services
      • βš”οΈAttacking Common Services
      • πŸ”€Pivoting, Tunneling & Port Forwarding
      • 🏰Active Directory Enumeration & Attacks
        • πŸ”Initial Domain Enumeration
        • ☣️LLMNR/NBT-NS Poisoning from Linux
        • πŸͺŸLLMNR/NBT-NS Poisoning from Windows
        • πŸ”Password Policy Enumeration
        • πŸ‘₯Password Spraying - Target User Lists
        • 🐧Password Spraying from Linux
        • πŸͺŸPassword Spraying from Windows
        • πŸ›‘οΈSecurity Controls Enumeration
        • 🐧Credentialed Enumeration from Linux
        • πŸͺŸCredentialed Enumeration from Windows
        • πŸ΄β€β˜ οΈLiving Off the Land
        • 🎫Kerberoasting from Linux
        • 🎫Kerberoasting from Windows
        • πŸ”‘ACL Enumeration
        • 🎯ACL Abuse Tactics
        • πŸ’ŽDCSync Attack
        • πŸ”Privileged Access
        • 🎭Kerberos "Double Hop" Problem
        • ⚑Bleeding Edge Vulnerabilities
        • πŸ”§Miscellaneous Misconfigurations
        • πŸ”—Domain Trusts Primer
        • ⬆️Child β†’ Parent Trust Attacks
        • 🐧Child β†’ Parent Trust Attacks - from Linux
        • 🌲Cross-Forest Trust Abuse - from Windows
        • 🐧Cross-Forest Trust Abuse - from Linux
        • 🎯Skills Assessment Part I - Complete Walkthrough
        • πŸš€Skills Assessment Part II - Advanced Professional Methodology
      • πŸ–₯️Remote Management
      • πŸ•·οΈWeb Enumeration
      • 🌐Web Application Attacks
      • πŸ”Password Attacks & Lateral Movement
      • πŸͺŸWindows Privilege Escalation
      • 🐧Linux Privilege Escalation
      • πŸ“‹Documentation & Reporting
      • 🌐Attacking Enterprise Networks
    • πŸ“˜CWEE Preparation
    • βœ…PJPT - Completed
  • πŸ”§Core Knowledge Areas
    • πŸ”Information Gathering
    • 🐧Linux Privilege Escalation
    • πŸͺŸWindows Privilege Escalation
    • πŸ› οΈTools & Utilities
Powered by GitBook
On this page
  1. πŸ†Certification Preparation
  2. βœ…CPTS - Completed

🏰Active Directory Enumeration & Attacks

πŸ”Initial Domain Enumeration☣️LLMNR/NBT-NS Poisoning from LinuxπŸͺŸLLMNR/NBT-NS Poisoning from WindowsπŸ”Password Policy EnumerationπŸ‘₯Password Spraying - Target User Lists🐧Password Spraying from LinuxπŸͺŸPassword Spraying from WindowsπŸ›‘οΈSecurity Controls Enumeration🐧Credentialed Enumeration from LinuxπŸͺŸCredentialed Enumeration from WindowsπŸ΄β€β˜ οΈLiving Off the Land🎫Kerberoasting from Linux🎫Kerberoasting from WindowsπŸ”‘ACL Enumeration🎯ACL Abuse TacticsπŸ’ŽDCSync AttackπŸ”Privileged Access🎭Kerberos "Double Hop" Problem⚑Bleeding Edge VulnerabilitiesπŸ”§Miscellaneous MisconfigurationsπŸ”—Domain Trusts Primer⬆️Child β†’ Parent Trust Attacks🐧Child β†’ Parent Trust Attacks - from Linux🌲Cross-Forest Trust Abuse - from Windows🐧Cross-Forest Trust Abuse - from Linux🎯Skills Assessment Part I - Complete WalkthroughπŸš€Skills Assessment Part II - Advanced Professional Methodology
PreviousComplete Skills AssessmentNextInitial Domain Enumeration

Last updated 3 months ago