Pentesting notes
search
⌘Ctrlk
Pentesting notes
  • 🏠/home/kabaneridev/.pt-notes
  • πŸ†Certification Preparation
    • βœ…CPTS - Completed
    • πŸ“˜CWEE Preparation
    • βœ…PJPT - Completed
      • 🎯Quick Reference
      • βœ…Master Checklist
      • πŸ“ŠMind Maps & Attack Flows
      • 🎯Active Directory Techniques
        • LLMNR Poisoning
        • Kerberoasting
        • GPP/cPassword Attacks
        • Pass Attacks (PTH/PTT)
        • Domain Enumeration
        • Golden Ticket Attacks
        • IPv6 Attacks
        • SMB Relay Attacks
        • Token Impersonation
        • NTDS.dit Extraction
        • Windows Persistence
        • Post-Compromise Strategy
      • 🌐Web & Wireless
  • πŸ”§Core Knowledge Areas
    • πŸ”Information Gathering
    • 🐧Linux Privilege Escalation
    • πŸͺŸWindows Privilege Escalation
    • πŸ› οΈTools & Utilities
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ†Certification Preparationchevron-right
  2. βœ…PJPT - Completed

🎯Active Directory Techniques

LLMNR Poisoningchevron-rightKerberoastingchevron-rightGPP/cPassword Attackschevron-rightPass Attacks (PTH/PTT)chevron-rightDomain Enumerationchevron-rightGolden Ticket Attackschevron-rightIPv6 Attackschevron-rightSMB Relay Attackschevron-rightToken Impersonationchevron-rightNTDS.dit Extractionchevron-rightWindows Persistencechevron-rightPost-Compromise Strategychevron-right
PreviousTechniques Mind Mapchevron-leftNextLLMNR Poisoningchevron-right

Last updated 7 months ago