O
O
OSCP Notes
Search
⌃
K
Introduction
Port scanning
Passive Information Gathering
Ports enum:
Recon Tools
Tech Skills Needed
msfvenom
meterpreter commands
Web Apps
python scripts
Windows hacks
Port Forwarding
Reverse shells
Binary exploitation
Transfering Modules
Buffer Overflow
Cracking!
shellshock
Active Directory
Enumeration
Lateral movement
Service Account Attacks (Example Path)
Easy win with dumping cleartext password
Golden Ticket
Try Hack Me: Active Directory Basics
Attacking Kerberos THM Write-up
Accessing Attacktive Directory THM Write-up
LLMNR Poisoning
HTB Write-up Active (Windows) - Active Directory
Forest HTB (ippsec) -followthrough
Pass the NTLM hash
Attack Vectors
Post Enumeration for AD
Resources
Antivirus Evasion
Windows Priv Esc
Linux Priv Esc
Active Directory Case Studies
Pivoting
C program analysis
Misc
Hack the box Write-ups
THM Offensive Security Path
Proving Ground
Cyber Sec Labs
Powered By
GitBook
Comment on page
Post Enumeration for AD
Tools: Powerview, bloodhound
Method1: Powerview
1.
Upload a script on the target windows machine
2.
On the machine, type
powershell -ep bypass (ep stops us from executing scripts)
3.
. .\PowerView.ps1 (if nothing happens, it's loaded)
4.
Get-NetDomain shows domain info
Method 2: Bloodhound
Previous
Attack Vectors
Next
Resources
Last modified
1yr ago