πͺCredentialed Enumeration from Windows
π Overview
π― Strategic Context
πͺ Windows vs Linux Enumeration Advantages
π οΈ Key Tools & Techniques
π§ ActiveDirectory PowerShell Module
π Overview
π Module Discovery and Loading
π° Domain Information Gathering
π₯ User Enumeration
π Trust Relationship Enumeration
π·οΈ Group Management
β‘ PowerView
π Overview
π Core PowerView Functions
π€ User Enumeration and Analysis
π Recursive Group Membership Analysis
π Trust Relationship Mapping
π Administrative Access Testing
π« Kerberoastable Account Discovery
π¨ SharpView
π Overview
π Basic Usage
π Snaffler
π Overview
π Basic Execution
π Example Snaffler Output
π― Sensitive File Categories
π©Έ BloodHound
π Overview
π§ SharpHound Data Collection
π BloodHound GUI Analysis
π Key BloodHound Queries
π― High-Impact Pre-built Queries
π Advanced Custom Queries
π― HTB Academy Lab Solutions
π Lab Questions & Solutions
π Question 1: "Using Bloodhound, determine how many Kerberoastable accounts exist within the INLANEFREIGHT domain. (Submit the number as the answer)"
β‘ Question 2: "What PowerView function allows us to test if a user has administrative access to a local or remote host?"
π Question 3: "Run Snaffler and hunt for a readable web config file. What is the name of the user in the connection string within the file?"
π Question 4: "What is the password for the database user?"
π§ Advanced Enumeration Techniques
π― Comprehensive User Analysis
π₯οΈ Computer and Service Analysis
π Permission and ACL Analysis
β‘ Quick Reference Commands
π§ Essential One-Liners
π Data Analysis and Correlation
π Key Takeaways
β
Windows Enumeration Advantages
π― Strategic Priorities
β οΈ Operational Considerations
π Next Steps After Enumeration
Last updated