-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Maximilian Birnbacher edited this page May 1, 2024
·
2 revisions
Welcome to the ADPentesting101 wiki!
The wiki includes guides for almost all stages (the ones I thought I would need) of a typical AD pentest you could encounter during an exam or even in the wild.
Here is a simple breakdown on how to pentest an AD:
- Reconnaissance Detecting a DC in the Network
- Find users, shares, etc. Enumeration
- Breach first user account Password Spray
- Get Windows machine in domain Domain Join
- Disable AV AMSI Bypass
- More reconnaissance Creating an Attack Path
- Elevate privileges WIP
- Dump hashes with the required rights Dumping Hashes
- Access privileged account without password PtH, PtT
- Actions on objective
OR
- Get desired user
- Good old DCSync DCSync Attack
OR
- Kerberoasting WIP
OR
- Credential Theft Shuffle (external) Attack Methods for Gaining Domain Admin Rights in Active Directory