Windows, Linux, and Active Directory CTF Notes
Ctrlk
  • Table of Content
  • Word of Wisdom
  • Enumeration
  • Active Directory
    • Working Directory and Files
    • First Recon
    • User Recon
    • Init Cred Acess
    • Init NTLMv2 Theft
    • Kerberos Quick Win
    • Domain Recon
    • AD Attack Recon
    • Bloodhound Walkthrough
    • Kerberos Attack
    • ACL Abuse
    • Group Policy Abuse
    • Logon Script Abuse
    • ADCS attacks
    • KrbRelayUp
    • Azure Connect Exploit
    • gMSA account
    • Dumping Domain Credentials
      • Secretdump.py
      • ntdsutil.exe - no credential required
      • Diskshadow - No credential required
      • vssadmin - no credential required
      • Wmic and Vssadmin Shadow Copy
      • Mimikatz
  • Windows Priv
  • Linux Priv
  • Credential Access
  • Pivoting / Network
  • File Transfer
  • Web Attacks
  • Database Attacks
  • Metasploit
  • File Enum & Hunting
  • Unix Commands
  • Code Analysis
  • Reverse Shell
  • Remote Access & Lateral Movement
  • RCE Collection
  • Compiling
  • Interactive Shell
  • Reverse Shell
  • Post Exploitation
Powered by GitBook
On this page
  1. Active Directory
  2. Dumping Domain Credentials

Mimikatz

Check Post Exploitation section.

PreviousWmic and Vssadmin Shadow CopyNextWindows Priv

Last updated 1 year ago