Attacking Active Directory
Ctrlk
  • Reconnaissance
  • Exploiting With Poison and Relay
  • User Enumeration Exploit
    • setup /etc/hosts and kerberos
    • Exploiting Username - ASREPRoast
    • Password Spraying
    • User listing with GetADUsers and ldapsearch
    • Kerberoasting
    • Powerview
      • Setting Up PowerView
      • Get-NetUser
      • Get-NetGroup
      • Get-NetComputer
      • Get-NetFileServer
      • Get-NetGPO
      • Get-ObjectAcl
      • Get-NetDomainTrust
      • Invoke-Portscan
    • Enumerate Shares with User Account
  • Exploiting with Users
  • WSUS Exploit
  • Active Directory Certificate Services (ADCS)
  • Metasploit
  • Privilege Escalation
  • User ACL Exploits
  • MSSQL servers Exploitation
  • Delegations
  • Trust
  • Exploiting IIS & Privilege escalation
  • Impacket
Powered by GitBook
On this page
  1. User Enumeration Exploit

Powerview

Setting Up PowerViewGet-NetUserGet-NetGroupGet-NetComputerGet-NetFileServerGet-NetGPOGet-ObjectAclGet-NetDomainTrustInvoke-Portscan
PreviousKerberoastingNextSetting Up PowerView

Last updated 2 years ago