⚔️
Pentest CodeX
search
⌘Ctrlk
LinkedInGithub
⚔️
Pentest CodeX
  • 🏠HOME
    • About Me
  • 🛡️PENTESTING
    • RECON
    • SERVICES
    • WEB
    • OPERATIONS
    • PRIVESC
    • ACTIVE DIRECTORY
      • 00-overview
      • 01-initial-access
      • 02-enumeration
      • 03-privilege-escalation
        • ESC14 - exploit
        • ESC7 - exploit
        • add-domain-group-member
        • asreproasting-abuse
        • Exploiting Certificates
        • dcsync-abuse
        • dcsync-and-golden-ticket
        • dcsync
        • dns-record
        • extra-sids
        • force-change-password
        • generic-all
        • GenericWrite - (over a user)
        • gpo-abuse
        • Group policy preferences (GPP) passwords
        • Exploiting Kerberos Delegation
        • kerberos-ms14-068
        • no-password-required
        • nopac
        • password-in-description-filed
        • Exploiting Permission Delegation
        • PetitPotam (MS-EFSRPC) (without authentication to the domain)
        • print-nightmare
        • printer-bug-ms-prn
        • Privileged Access Enumeration and Exploitation
        • retrieve-password
        • reverse-encryption-password-storage-attack
        • set-domain-object
        • set-domian-user-password
        • sid-history-injection
        • sniffing-ladp-credentials
        • sysvol-pillaging
        • write-owner
      • 05-lateral-movement
      • 06-credential-attacks
      • 07-defenses
      • 08-tools-usage
  • ⚒️COURSES
    • CPTS
    • OSCP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. 🛡️PENTESTINGchevron-right
  2. ACTIVE DIRECTORYchevron-right
  3. 03-privilege-escalation

set-domain-object

Previousreverse-encryption-password-storage-attackchevron-leftNextset-domian-user-passwordchevron-right

Last updated 1 day ago