Attacking Active Directory
search
Ctrlk
  • Reconnaissancechevron-right
  • Exploiting With Poison and Relaychevron-right
  • User Enumeration Exploitchevron-right
    • setup /etc/hosts and kerberos
    • Exploiting Username - ASREPRoast
    • Password Spraying
    • User listing with GetADUsers and ldapsearch
    • Kerberoasting
    • Powerviewchevron-right
      • Setting Up PowerView
      • Get-NetUser
      • Get-NetGroup
      • Get-NetComputer
      • Get-NetFileServer
      • Get-NetGPO
      • Get-ObjectAcl
      • Get-NetDomainTrust
      • Invoke-Portscan
    • Enumerate Shares with User Account
  • Exploiting with Userschevron-right
  • WSUS Exploit
  • Active Directory Certificate Services (ADCS)chevron-right
  • Metasploitchevron-right
  • Privilege Escalation
  • User ACL Exploitschevron-right
  • MSSQL servers Exploitationchevron-right
  • Delegationschevron-right
  • Trustchevron-right
  • Exploiting IIS & Privilege escalationchevron-right
  • Impacketchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. User Enumeration Exploit

Powerview

Setting Up PowerViewchevron-rightGet-NetUserchevron-rightGet-NetGroupchevron-rightGet-NetComputerchevron-rightGet-NetFileServerchevron-rightGet-NetGPOchevron-rightGet-ObjectAclchevron-rightGet-NetDomainTrustchevron-rightInvoke-Portscanchevron-right
PreviousKerberoastingchevron-leftNextSetting Up PowerViewchevron-right

Last updated 2 years ago