⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
    • ACTIVE DIRECTORY
      • 00-overview
      • 01-initial-access
      • 02-enumeration
      • 03-privilege-escalation
        • ESC14 - exploit
        • ESC7 - exploit
        • add-domain-group-member
        • asreproasting-abuse
        • Exploiting Certificates
        • dcsync-abuse
        • dcsync-and-golden-ticket
        • dcsync
        • dns-record
        • extra-sids
        • force-change-password
        • generic-all
        • GenericWrite - (over a user)
        • gpo-abuse
        • Group policy preferences (GPP) passwords
        • Exploiting Kerberos Delegation
        • kerberos-ms14-068
        • no-password-required
        • nopac
        • password-in-description-filed
        • Exploiting Permission Delegation
        • PetitPotam (MS-EFSRPC) (without authentication to the domain)
        • print-nightmare
        • printer-bug-ms-prn
        • Privileged Access Enumeration and Exploitation
        • retrieve-password
        • reverse-encryption-password-storage-attack
        • set-domain-object
        • set-domian-user-password
        • sid-history-injection
        • sniffing-ladp-credentials
        • sysvol-pillaging
        • write-owner
      • 05-lateral-movement
      • 06-credential-attacks
      • 07-defenses
      • 08-tools-usage
  • ⚒️COURSES
    • CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🛡️PENTESTINGchevron-right
  2. ACTIVE DIRECTORY

03-privilege-escalation

ESC14 - exploitchevron-rightESC7 - exploitchevron-rightadd-domain-group-memberchevron-rightasreproasting-abusechevron-rightExploiting Certificateschevron-rightdcsync-abusechevron-rightdcsync-and-golden-ticketchevron-rightdcsyncchevron-rightdns-recordchevron-rightextra-sidschevron-rightforce-change-passwordchevron-rightgeneric-allchevron-rightGenericWrite - (over a user)chevron-rightgpo-abusechevron-rightGroup policy preferences (GPP) passwordschevron-rightExploiting Kerberos Delegationchevron-rightkerberos-ms14-068chevron-rightno-password-requiredchevron-rightnopacchevron-rightpassword-in-description-filedchevron-rightExploiting Permission Delegationchevron-rightPetitPotam (MS-EFSRPC) (without authentication to the domain)chevron-rightprint-nightmarechevron-rightprinter-bug-ms-prnchevron-rightPrivileged Access Enumeration and Exploitationchevron-rightretrieve-passwordchevron-rightreverse-encryption-password-storage-attackchevron-rightset-domain-objectchevron-rightset-domian-user-passwordchevron-rightsid-history-injectionchevron-rightsniffing-ladp-credentialschevron-rightsysvol-pillagingchevron-rightwrite-ownerchevron-right
Previouswmicchevron-leftNextESC14 - exploitchevron-right

Last updated 18 hours ago