⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • Home
    • WHOAMI
  • Network Pentest
    • Recon
    • Enumeration
    • Exploitation
    • Pre Exploitation
    • Post-Exploitation
    • Privilege Escalation
    • Active Directory Attack
      • Enumeration
      • Attack Techniques
      • Advanced Exploitation Techniques
        • Active Directory Trust Attacks
        • ADCS Attacks
        • DACL Attacks
        • Intro to C2 Operations with Sliver
        • Introduction to Windows Evasion Techniques
        • Kerberos Attacks
        • MSSQL, Exchange, and SCCM Attacks
        • NTLM Relay Attacks
        • Exploiting Active Directory (THM)
        • Persisting Active Directory (THM)
          • Computer Accounts
          • Directory Service Restore Mode (DSRM)
          • Malicious Security Support Provider (SSP)
          • Persistence through ACLs
          • Persistence through Certificates
          • Persistence through Credentials
          • Persistence through GPOs
          • Persistence through Group Membership
          • Persistence through SID History
          • Persistence through Tickets
          • Skeleton keys
      • Lateral Movement
  • Courses
    • HTB-CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Network Pentestchevron-right
  2. Active Directory Attackchevron-right
  3. Advanced Exploitation Techniques

Persisting Active Directory (THM)

Computer Accountschevron-rightDirectory Service Restore Mode (DSRM)chevron-rightMalicious Security Support Provider (SSP)chevron-rightPersistence through ACLschevron-rightPersistence through Certificateschevron-rightPersistence through Credentialschevron-rightPersistence through GPOschevron-rightPersistence through Group Membershipchevron-rightPersistence through SID Historychevron-rightPersistence through Ticketschevron-rightSkeleton keyschevron-right
PreviousExploiting Permission Delegationchevron-leftNextComputer Accountschevron-right

Last updated 10 months ago