Pentesting Quick Reference OSCP and Beyond
CtrlK
  • Basic Tools & Techniques
  • Linux Basics
  • Windows Basics
  • Shells
  • Uploading Shells/ Transferring Files
  • FootPrinting
  • Host Discovery
  • Scanning
  • Vulnerability assessment
  • Metasploit and Meterpreter
  • Brute Forcing/ Password Cracking
  • Linux Remote Management Protocols
  • Windows Remote Management Protocols
  • Port 20/21 - FTP Pentesting
  • Port 23 Telnet
  • Port 25 - SMTP
  • IMAP/ POP3
  • Port 53 DNS
  • Port 445 - SMB
  • Port 111 -RPC Bind
  • Port 135 - RPC
  • Port 137 NetBios
  • Port 161 SNMP
  • Port 1433 - MSSQL
  • Port 1521 Oracle TNS
  • Port 1833 - MQTT
  • Port 2049 - NFS
  • Port 3306 MySQL
  • Port 3389 - RDP
  • Port 5985 - Winrm
  • Port 632 (UDP) IPMI
  • Redis (6379)
  • Port 10000 Webmin
  • Privilege Escalation
  • Active Directory
    • AD Basics
    • Initial Enumeration of AD
    • Password Spraying
    • LLMNR Poisoning
    • SMB/ NTLM Relay Attacks
    • IPv6 Attacks
    • Passback Attacks
    • AS-REP roasting
    • AD Shell
    • AD Enumeration
    • Post Compromise
    • Pivoting
    • Lateral Movement
    • Privilege Escalation
    • Access Control List (ACL) Abuse Primer
    • Post Owning Domain
    • AD Common Vulnerablities
    • Bleeding Edge Vulnerabilities
    • Domain Trusts
    • Maintaining Access
    • Clean Up
    • Hardening Active Directory
    • Additional AD Auditing Techniques
    • HTB AD Enumeration & Attacks - Skills Assessment Part I
  • Web Pentesting
  • Cryptography
  • More Resources
  • Forensics
  • IoT Security
  • API Security
  • Binary Exploitation
  • Boxes/ Machines
  • Private Challenges
  • Misc tools
  • SOC Analyst Resources
  • OSCP Tips and Misc
  • Mobile Hacking
  • Buffer Overflow
  • Wordpress
  • Web3 and Blockchain Security
  • WIFI Hacking
  • Misc Tricks
Powered by GitBook
On this page
  • Abusing ZeroLogon
  • PrintNightmare (CVE-2021-1675)
  1. Active Directory

AD Common Vulnerablities

Abusing ZeroLogon

We set up the domain controller password as null

LogoWhat Is Zerologon?Trend Micro
LogoGitHub - dirkjanm/CVE-2020-1472: PoC for Zerologon - all research credits go to Tom Tervoort of SecuraGitHub
exploit
LogoGitHub - SecuraBV/CVE-2020-1472: Test tool for CVE-2020-1472GitHub
SecuraBV ZeroLogon Checker
scanning
Attacking
checking if attack is succesful
Restore Password

PrintNightmare (CVE-2021-1675)

LogoGitHub - cube0x0/CVE-2021-1675: C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527GitHub
cube0x0 RCE
LogoGitHub - calebstewart/CVE-2021-1675: Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)GitHub
calebstewart LPE
scanning for if vulnerable

Make a malicious dll

share the directory

Exploitation

PreviousSilver TicketNextBleeding Edge Vulnerabilities

Last updated 4 months ago