KARIM ASHRAF SPACE.
Ctrlk
  • Who Am I ?
  • WRITEUPS
    • What about Practice in Cyber Security?
    • Dark Side of VSCode
    • What about Cy-nix Machine?
    • Cyberdefenders Labs
    • Lets Defend
    • BTLO LABS
    • The Complete Active Directory Security Handbook
      • Introduction
      • Active Directory
      • Attack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)
      • Attack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)
      • Attack Technique 3: Kerberoasting
      • Attack Technique 4: Golden Ticket Attack
      • Attack Technique 5: DCShadow Attack
      • Attack Technique 6: AS-REP Roasting
      • Attack Technique 7: LDAP Injection Attack
      • Attack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)
      • Conclusion & References
    • Windows Privilege Escalation
    • Advanced Log Analysis
    • Methods for Stealing Password in Browser
  • The Ultimate Active Directory CheatSheet
  • COURSES SUMMARY
    • TCM SEC
    • The SecOps Group
    • Cybrary
  • TIPS&TRICKS
    • Windows Shorcuts Arrow Remover
    • Kali KEX
    • Intel TurboBoost
    • Pentest_Copilot
    • Ferdium
    • Youtube Adblock_Bybass
    • Burb-Bambdas
    • Burb Customizer
    • BetterFox
Powered by GitBook
On this page
  1. WRITEUPS

The Complete Active Directory Security Handbook

Exploitation, Detection, and Mitigation Strategies

IntroductionActive DirectoryAttack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)Attack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)Attack Technique 3: KerberoastingAttack Technique 4: Golden Ticket AttackAttack Technique 5: DCShadow AttackAttack Technique 6: AS-REP RoastingAttack Technique 7: LDAP Injection AttackAttack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)Conclusion & References
PreviousBruteforce BTLONextIntroduction