🏰
Pentesting Playbook
CtrlK
  • Pentesting Playbook
    • 🍰About
    • 🖥️The Process
      • 🔎Reconnaissance
        • 🔭Passive Reconnaissance
        • 👣Footprinting
        • 🕵️Active Reconnaissance
        • 🤖Automated Reconnaissance
      • 🐛Vulnerability Scanning & Testing
        • 🕸️Web Hacking
      • 💣Exploitation
        • 🏠Local File Inclusion (LFI)
        • 🐚Shells
        • 💉SQL Injection (SQLi)
          • 🗄️Databases
          • 🐬MySQL
          • 🗃️Database Enumeration
          • 📖Reading & Writing Files
          • 🗺️SQLMap
            • Database Enumeration
            • OS Exploitation
            • Bypassing Protection
        • ⚔️Cross Site Scripting (XSS)
      • 🔓Authentication
        • 🐧Linux Authentication
        • 🪟Windows Authentication
        • 🔑Brute Forcing Logins
        • 🔧Cracking Tools
      • ⬆️Privilege Escalation
        • 🐧Linux Escalation
        • 🪟Windows Escalation
    • ♥️Useful Extras
    • ☑️Engagement Checklist
  • Main Topics
    • 🖥️Networking
    • ⚔️Attacking Common Services
      • 🐬MySQL
      • ⚫MSSQL
      • 🖥️RDP
      • 🦁SMB
      • 🗃️FTP
      • 🌐DNS
      • ✉️Email
    • 📁Active Directory
      • 🔍Initial Enumeration
      • 🦶Getting a Foothold
      • 🧺Password Hunting and Gathering
      • 💦Password Spraying
      • 🔐Enumerating Security Controls
      • 🔑Credentialed Enumeration with Linux
      • 🔑Credentialed Enumeration with Windows
      • 🚜Living Off the Land
      • 🔥Keberoasting with Linux
      • 🔥Keberoasting with Windows
      • 🛂Access Control List (ACL)
      • 🗝️Privileged Access
      • 🔪Bleeding Edge Vulnerabilities
      • ⚙️Misconfigurations
      • 🤝Domain Trusts
        • 🪟Attacking Domain Trusts From Windows
        • 🐧Attacking Domain Trusts From Linux
        • 🌲Cross-Forest Trust Abuse From Windows
        • 🌳Cross-Forest Trust Abuse From Linux
    • ↗️Pivoting, Port Forwarding and Tunnelling
    • 🛠️Reverse Engineering
    • 🕵️Forensics
    • 🦈Pcap Analysis
    • 🗄️File Transfers
    • 🚜Living off The Land
    • 💎Metasploit Framework
    • ✍️Documentation & Reporting
  • Other Resources
    • ℹ️Interesting Attacks
  • Exam Prep
    • eCPPTv2 Prep
    • OSCP Prep
  • CTF
    • THM Rooms
      • Mustacchio
      • Plethora THM
      • Break Out The Cage
      • Probe
  • HTB Skill Assessments
    • AD Enumeration & Attacks - Skills Assessment Part I
    • AD Enumeration & Attacks - Skills Assessment Part II
Powered by GitBook
On this page

Was this helpful?

HTB Skill Assessments

AD Enumeration & Attacks - Skills Assessment Part IAD Enumeration & Attacks - Skills Assessment Part II
PreviousProbeNextAD Enumeration & Attacks - Skills Assessment Part I

Was this helpful?