Pentesting Quick Reference OSCP and Beyond
search
Ctrlk
  • Basic Tools & Techniques
  • Linux Basicschevron-right
  • Windows Basicschevron-right
  • Shells
  • Uploading Shells/ Transferring Files
  • FootPrinting
  • Host Discovery
  • Scanningchevron-right
  • Vulnerability assessmentchevron-right
  • Metasploit and Meterpreterchevron-right
  • Brute Forcing/ Password Crackingchevron-right
  • Linux Remote Management Protocols
  • Windows Remote Management Protocols
  • Port 20/21 - FTP Pentesting
  • Port 22 SSH
  • Port 23 Telnet
  • Port 25 - SMTP
  • Port 53 DNS
  • Port 110/995 POP3 and IMAP 146/993
  • Port 111 -RPC Bind
  • Port 135 - RPC
  • Port 137 NetBios
  • Port 137, 138 UDP NMDB
  • Port 161 SNMP
  • Port 445 - SMBchevron-right
  • Port 1433 - MSSQL
  • Port 1521 Oracle TNS
  • Port 1833 - MQTT
  • Port 2049 - NFS
  • Port 3306 MySQL
  • Port 3389 - RDP
  • Port 5985 - WINRM
  • Port 632 (UDP) IPMI
  • Redis (6379)
  • Port 10000 Webmin
  • Jenkins
  • Privilege Escalationchevron-right
  • Active Directorychevron-right
    • AD Basicschevron-right
    • Initial Enumeration of ADchevron-right
    • Password Sprayingchevron-right
    • LLMNR Poisoning
    • SMB/ NTLM Relay Attacks
    • IPv6 Attackschevron-right
    • Passback Attacks
    • AS-REP roasting
    • AD Shell
    • AD Enumerationchevron-right
    • Post Compromisechevron-right
    • Pivoting
    • Lateral Movement
    • Privilege Escalation
    • Access Control List (ACL) Abuse Primerchevron-right
    • Post Owning Domainchevron-right
    • AD Common Vulnerablities
    • Bleeding Edge Vulnerabilities
    • Domain Trustschevron-right
    • Maintaining Access
    • Clean Up
    • Hardening Active Directory
    • Additional AD Auditing Techniques
    • HTB AD Enumeration & Attacks - Skills Assessment Part I
    • Game of Active Directory
  • Web Pentestingchevron-right
  • Cryptography
  • More Resources
  • Forensics
  • IoT Security
  • API Security
  • Binary Exploitationchevron-right
  • Boxes/ Machineschevron-right
  • Private Challengeschevron-right
  • Misc toolschevron-right
  • Clearing Tracks
  • SOC Analyst Resources
  • OSCP Tips and Misc
  • Mobile Hacking
  • Buffer Overflow
  • Linux Vulnerabilities
  • Different Applications Vulnerabilitieschevron-right
  • Web3 and Blockchain Security
  • WIFI Hackingchevron-right
  • Misc Tricks
  • CTF Writeups
  • Social Engineering
  • Cloud Pentesting
    • AWS
  • AI-Pentesting
    • AI Based Pentesting tools
  • OT Security
    • OT Security Labs
    • M5StickC
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Active Directory

Game of Active Directory

LogoGitHub - yaldobaoth/GOAD-Red-Team-Report: This is the report that goes with my mock full-scope red team engagement against Game of Active Directory.GitHubchevron-right
PreviousHTB AD Enumeration & Attacks - Skills Assessment Part Ichevron-leftNextWeb Pentestingchevron-right

Last updated 3 days ago