Attacking Active Directory
search
Ctrlk
  • Reconnaissancechevron-right
  • Exploiting With Poison and Relaychevron-right
  • User Enumeration Exploitchevron-right
  • Exploiting with Userschevron-right
  • WSUS Exploit
  • Active Directory Certificate Services (ADCS)chevron-right
  • Metasploitchevron-right
  • Privilege Escalation
  • User ACL Exploitschevron-right
  • MSSQL servers Exploitationchevron-right
    • Enumerate the MSSQL servers
    • Enumerate MSSQL servers with GetUserSPNs & NMAP
    • Enumerate MSSQL servers with CrackMap & Impacket
    • impersonate - execute as login
    • MSSQL Coerce and relay
    • MSSQL trusted links
    • MSSQL Command execution to shell - Yonkers
    • MSSQL Command execution to shell - Salisbury
  • Delegationschevron-right
  • Trustchevron-right
  • Exploiting IIS & Privilege escalationchevron-right
  • Impacketchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

MSSQL servers Exploitation

Enumerate the MSSQL serverschevron-rightEnumerate MSSQL servers with GetUserSPNs & NMAPchevron-rightEnumerate MSSQL servers with CrackMap & Impacketchevron-rightimpersonate - execute as loginchevron-rightMSSQL Coerce and relaychevron-rightMSSQL trusted linkschevron-rightMSSQL Command execution to shell - Yonkerschevron-rightMSSQL Command execution to shell - Salisburychevron-right
PreviousRead Laps passwordchevron-leftNextEnumerate the MSSQL serverschevron-right

Last updated 2 years ago