✒️
Pentesting Cheatsheet
  • Introduction
  • Basics
  • Information Gathering | OSINT
  • Penetration Testing
    • Scanning and Enumeration
    • HTTP and HTTPS
    • SMB | Windows Domain Enumeration
    • NFS
    • SMTP
    • Reverse Shells
    • Buffer Overflow | Buf Exploitation
    • Linux Privilege Escalation
    • Miscellaneous
    • Redis
  • Active Directory
    • AD Extras
    • Attack Vectors
    • Post Compromise Enumeration
    • Post Compromise Attacks
  • Pivoting
  • Windows Privesc
    • Window Tools/Resources
    • Meterpreter Privesc
    • Powershell Scripting
  • Vulnhub/ PG/ THM/ HTB
  • Apache Log4j
  • Linux Forensics Cheatsheet
Powered by GitBook
On this page

Was this helpful?

  1. Active Directory

AD Extras

PreviousActive DirectoryNextAttack Vectors

Last updated 3 years ago

Was this helpful?

Making Word list of suspected users to do kerbrute for valid users

CTF-bash-tools/ctf-wordlist-names.sh at master · PinkDraconian/CTF-bash-toolsGitHub
GitHub - ropnop/kerbrute: A tool to perform Kerberos pre-auth bruteforcingGitHub
Logo
Logo