KARIM ASHRAF SPACE.
search
Ctrlk
  • Who Am I ?
  • WRITEUPS
    • What about Practice in Cyber Security?
    • Dark Side of VSCode
    • What about Cy-nix Machine?
    • Cyberdefenders Labschevron-right
    • Lets Defendchevron-right
    • BTLO LABSchevron-right
    • The Complete Active Directory Security Handbookchevron-right
      • Introduction
      • Active Directory
      • Attack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)
      • Attack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)
      • Attack Technique 3: Kerberoasting
      • Attack Technique 4: Golden Ticket Attack
      • Attack Technique 5: DCShadow Attack
      • Attack Technique 6: AS-REP Roasting
      • Attack Technique 7: LDAP Injection Attack
      • Attack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)
      • Conclusion & References
    • Windows Privilege Escalationchevron-right
    • Advanced Log Analysischevron-right
    • Methods for Stealing Password in Browserchevron-right
  • The Ultimate Active Directory CheatSheet
  • LLM Security From Zero To Hero
  • COURSES SUMMARY
    • TCM SECchevron-right
    • The SecOps Groupchevron-right
    • Cybrarychevron-right
  • TIPS&TRICKS
    • Windows Shorcuts Arrow Remover
    • Kali KEX
    • Intel TurboBoost
    • Pentest_Copilot
    • Ferdium
    • Youtube Adblock_Bybass
    • Burb-Bambdas
    • Burb Customizer
    • BetterFox
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. WRITEUPS

The Complete Active Directory Security Handbook

Exploitation, Detection, and Mitigation Strategies

Introductionchevron-rightActive Directorychevron-rightAttack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)chevron-rightAttack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)chevron-rightAttack Technique 3: Kerberoastingchevron-rightAttack Technique 4: Golden Ticket Attackchevron-rightAttack Technique 5: DCShadow Attackchevron-rightAttack Technique 6: AS-REP Roastingchevron-rightAttack Technique 7: LDAP Injection Attackchevron-rightAttack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)chevron-rightConclusion & Referenceschevron-right
PreviousBruteforce BTLOchevron-leftNextIntroductionchevron-right