Attacking Active Directory
Ctrlk
  • Reconnaissance
  • Exploiting With Poison and Relay
  • User Enumeration Exploit
  • Exploiting with Users
    • SamAccountName (NoPac)
      • Semi Manual Exploit
      • From Linux With NoPAC.py
      • From Windows With noPAC.exe
    • PrintNightmare - Bronx
    • PrintNightmare - Baltimore
  • WSUS Exploit
  • Active Directory Certificate Services (ADCS)
  • Metasploit
  • Privilege Escalation
  • User ACL Exploits
  • MSSQL servers Exploitation
  • Delegations
  • Trust
  • Exploiting IIS & Privilege escalation
  • Impacket
Powered by GitBook
On this page
  1. Exploiting with Users

SamAccountName (NoPac)

Semi Manual ExploitFrom Linux With NoPAC.pyFrom Windows With noPAC.exe
PreviousExploiting with UsersNextSemi Manual Exploit

Last updated 2 years ago