Best Active Directory Resources ^ ⌃
⍰ Just open it
⍰ I think it's enough!
Mini book
https://0xsp.com/offensive/active-directory-attack-defense/
#ad #active_directory #windows
⍰ Just open it
Twitter : @zer1t0
⊞ Attacking Active Directory: 0 to 0.9
⍰ I think it's enough!
LinkedIn: Sean Metcalf
His Blog:
⊞ https://adsecurity.org/
His Compony:
⊞ https://www.trimarcsecurity.com/research
Mini book
https://0xsp.com/offensive/active-directory-attack-defense/
#ad #active_directory #windows
👾7🔥4❤1
Understanding - or at least, trying to
Credit: ATTL4S
BloG
#windows #ad #active_directory
Credit: ATTL4S
windows lateral movement, kerberos , payloads, active directory,etc
BloG
#windows #ad #active_directory
❤5👏2🤡2
Credential_Dumping_NTDS_dit_1628039354.pdf
1.2 MB
Credential Dumping: NTDS.dit
In this article, you will learn how passwords are stored in NTDS.dit file on Windows Server and then we will learn how to dump these credentials hashes from NTDS.dit file.
Table of Content
▪ Introduction to NTDS ▪ NTDSPartitions
▪ DatabaseStorageTable
▪ ExtractingCredentialbyExploitNTDS.ditinMultipleMethods
▪ FGDump
▪ NTDSUtil
▪ DSInternals
▪ NTDSDumpEx ▪ Metasploit
▪ NTDS_location ▪ NTDS_grabber ▪ secretsdump
▪ CrackMapExec
▪ CrackingHashes
#ad #active_directory
👍8