Showing posts with label Active Directory. Show all posts
Showing posts with label Active Directory. Show all posts

Abusing GMSA Permissions - What You Need to Know as a Pentester

Group Managed Service Accounts (gMSAs) are designed to simplify password management for services running across multiple servers in a domain...

IPv6 DNS Takeover - Attacking & Exploitation IPV6

IPv6 is enabled by default on Windows networks starting from Windows Vista and Server 2008. This default configuration presents an opportun...

Understanding Kerberos Authentication and its Attacks

Kerberos is a widely used authentication protocol that ensures secure identity verification within networks. It relies on a trusted third pa...

Pentesting Domain Controllers Cheatsheet

In this blog post, we will share with you a comprehensive cheatsheet for pentesting those powerful and critical domain controllers. Now, I k...

SMB Pentest Checklist

  SMB Enumeration smbmap -H 10.10.10.10 //Check Privileges smbmap -H 10.10.10.10 -R --depth 5 smbclient -L //10.10.10.10/ ...

Abusing DPAPI using Mimikatz

What is DPAPI ?  According to wiki, DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programm...

Relay Attacks - Active Directory Penetration Testing

  Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...

Active Directory PenTest Cheat Sheet - Lateral Movement & Persistence Techniques

Hello Readers, Welcome to Hacking Dream. Today' post is on Active directory Penetration testing, this is a continuation of  ACTIVE DIREC...

Active Directory Penetration Testing Cheat Sheet - Recon & Initial Access

Hello Everyone, I am back after a long time. Today' post is on Active directory reconnaissance and gaining initial foot hold into the ta...