Cheat Sheet Hacking
Ctrlk
  • 🌐Generic Ideas
    • File Transfer
    • Reverse Shell
    • Cracking Tricks
    • Tunneling and Port Forwarding
    • Reversing
    • OSINT
    • Phishing
  • 🐕‍🦺Port enumeration
    • Reconnaissance
    • 53 - DNS
    • 80,443 - Web
    • 445 - SMB
    • 389, 636, 3268 - LDAP(S)
  • LINUX THINGS
    • Enumeration
    • Privilege Escalation
  • WINDOWS THINGS
    • Enumeration
    • Useful Commands
    • Active Directory Methodology
      • Commands to create AD environment
      • Attacks
        • Kerberos
        • Secrets dump
        • Pass The Hash
        • Dump NTDS
        • Tickets
        • NTML Password Spray
        • LDAP Authentication
        • SMB Relay (LLNMR, NTB-NS & WPAD)
        • NTLM Relay
        • Tools to exploit AD things
        • SCF Files
      • Kerberos
      • SAM & LSA secrets
      • Enumeration
      • Resources
      • RunAs
      • Post Explotation
      • Common used tools
  • 🕳️Pivoting
    • Port Forwarding
    • Socks Forwarding
    • Routing
    • Web Fuzzing
    • Transfer files
    • Metasploit
    • Burp Suite
  • 🎛️Hardware
    • Physical attacks
  • 🌕Buffer Overflow
    • Introduction
    • Stack-Based
  • 🐳Docker
    • Commands
    • Practical examples
  • 💡Useful things
    • Burp Suite
    • Linux Commands
    • Recreate multipart/form-data request
    • TTY
    • Templates for reports (exams)
    • Tmux
    • Other cheat sheets
Powered by GitBook
On this page
  1. WINDOWS THINGS
  2. Active Directory Methodology

Attacks

KerberosSecrets dumpPass The HashDump NTDSTicketsNTML Password SprayLDAP AuthenticationSMB Relay (LLNMR, NTB-NS & WPAD)NTLM RelayTools to exploit AD thingsSCF Files
PreviousCommands to create AD environmentNextKerberos