The Hacker Recipes
CtrlK
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
      • DC Shadow
      • SID History
      • Skeleton key
      • GoldenGMSA
      • AdminSDHolder
      • Kerberos
      • Certificate Services (AD-CS)
      • 🛠️DACL abuse
      • Shadow Principals (PAM)
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • 🛠️(EDR) Endpoint Detection and Response
  • 🛠️Physical
    • Locks
    • Networking
    • Machines
    • Super secret zones
  • 🛠️Intelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • 🛠️RADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • 🛠️mobile apps
    • Android
    • iOS
Powered by GitBook
On this page

Was this helpful?

  1. Active Directory

Persistence

DC ShadowSID HistorySkeleton keyGoldenGMSAAdminSDHolderKerberosCertificate Services (AD-CS)🛠️DACL abuseShadow Principals (PAM)
PreviousRODCNextDC Shadow

Last updated 3 years ago

Was this helpful?