ActiveNemesis 💀

Search

SearchSearch
        • Gaining shell access (in AD)
        • Initial Internal Attack Strategy (AD)
        • IPv6 Attacks
        • LLMNR Poisoning
        • Passback Attacks
        • SMB Relay Attacks
        • ZeroLogon
        • Clean up
        • File transfer
        • Maintaining access
        • Pivot
        • Dumping and cracking hashes
        • GPP Attacks (cPassword Attacks)
        • Kerberoasting
        • LNK File Attacks
        • Pass Attacks
        • Post-Compromise Attacks Strategy (AD)
        • PrintNightmare
        • Token Impersonation
        • Domain Enumeration with Bloodhound
        • Domain Enumeration with ldapdomaindump
        • Domain Enumeration with Plumhound
        • Post-Compromise Enumeration Strategy
        • Dumping the NTDS.dit
        • Golden Ticket and Pass the Ticket Attacks
        • Post-Domain Compromise Attack Strategy
      • Methodology and SUPER IMPORTANT CONSIDERATIONS
      • Active Directory
      • Logical Active Directory components
      • Physical Active Directory components
    Home

    ❯

    Attacking Active Directory

    ❯

    Initial Attack Vectors

    ❯

    Initial Internal Attack Strategy (AD)

    Initial Internal Attack Strategy (AD)

    Aug 26, 20241 min read

    • PEH

    Initial Internal Attack Strategy

    Multitask

    Don’t wait for the results of responder or mitm6, always do something and think outside of the box.

    Related

    • LLMNR Poisoning
    • SMB Relay Attacks
    • Gaining shell access (in AD)
    • IPv6 Attacks
    • Passback Attacks
    • ZeroLogon

    Graph View

    • Initial Internal Attack Strategy
    • Related

    Backlinks

    • Methodology and SUPER IMPORTANT CONSIDERATIONS
    • Welcome to ActiveNemesis

    • Linktree