SavitarX
Ctrlk
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
      • CPTS
        • Getting Started
        • Network Enumeration with Nmap
        • Web Fuzzing
        • Footprinting
        • Attacking Common Services
        • File Transfers
        • Shells & Payloads
        • Using Metasploit Framework
        • Password Attacks
        • Pivoting, Tunneling, and Port Forwarding
        • Active Directory Enumeration & Attacks
          • Initial Enumeration of the Domain
          • LLMNR/NBT-NS Poisoning - from Linux
          • LLMNR/NBT-NS Poisoning - from Windows
          • Enumerating & Retrieving Password Policies
          • Password Spraying - Making a Target User List
          • Internal Password Spraying - from Linux
          • Internal Password Spraying - from Windows
          • Enumerating Security Controls
          • Credentialed Enumeration - from Linux
          • Credentialed Enumeration - from Windows
          • Living Off the Land
          • Kerberoasting - from Linux
          • Kerberoasting - from Windows
          • ACL Enumeration
          • ACL Abuse Tactics
          • DCSync
          • Privileged Access
    • Blue Team
    • Web Pentesting
  • Writeups
    • Tryhackme
  • Machines to pratice for
    • CPTS Preparation
    • CDSA Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
Powered by GitBook
On this page
  1. CERTIFICATIONS & notes
  2. Red Team
  3. CPTS

Active Directory Enumeration & Attacks

Initial Enumeration of the DomainLLMNR/NBT-NS Poisoning - from LinuxLLMNR/NBT-NS Poisoning - from WindowsEnumerating & Retrieving Password PoliciesPassword Spraying - Making a Target User ListInternal Password Spraying - from LinuxInternal Password Spraying - from WindowsEnumerating Security ControlsCredentialed Enumeration - from LinuxCredentialed Enumeration - from WindowsLiving Off the LandKerberoasting - from LinuxKerberoasting - from WindowsACL EnumerationACL Abuse TacticsDCSyncPrivileged Access
PreviousLigolo-ngNextInitial Enumeration of the Domain