Skip to main content
Ctrl+K
MyHackBook - Home MyHackBook - Home

Contents

  • -> Start Here
  • Fundamentals
    • Shells
    • Payloads
    • Password Attacks 101
  • Active Directory
    • Basics
    • Example AD Lab
    • Attacking AD
      • Initial Attack Vectors
        • LLMNR Poisoning
        • SMB Relay
        • IPv6 Attacks
        • Passback Attacks
      • Enumeration
        • Credentials Injection
        • Manual Enumeration Techniques
        • Enumeration with ldapdomaindump
        • Enumeration with Bloodhound
      • Post Compromise Attacks
        • Pass Attacks
        • Mimikatz
        • Kerberoasting
        • Token Impersonation
        • LNK File Attacks
        • GPP cPassword Attacks
      • Post Domain Compromise Attacks
        • Dumping the NTDS.dit
        • Golden Ticket
  • Web App Pentesting
    • Cross-Site Scripting (XSS)
  • Scripts and Tools
  • Blogs
  • Writeups
  • .md

Attacking AD

Attacking AD#

This section contains notes on attacking Active Directory (AD)

  • Initial Attack Vectors
    • Starting Position and Goals
    • Methodology
    • Gaining Shell Access
  • Enumeration
    • Starting Position and Goals
    • Methodology
  • Post Compromise Attacks
    • Starting Position and Goals
    • Methodology
  • Post Domain Compromise Attacks
    • Starting Position and Goals
    • Methodology

previous

Example AD Lab

next

Initial Attack Vectors

By Rayen Manai

© Copyright 2025, Rayen Manai.