ActiveNemesis 💀

Search

SearchSearch
        • Gaining shell access (in AD)
        • Initial Internal Attack Strategy (AD)
        • IPv6 Attacks
        • LLMNR Poisoning
        • Passback Attacks
        • SMB Relay Attacks
        • ZeroLogon
        • Clean up
        • File transfer
        • Maintaining access
        • Pivot
        • Dumping and cracking hashes
        • GPP Attacks (cPassword Attacks)
        • Kerberoasting
        • LNK File Attacks
        • Pass Attacks
        • Post-Compromise Attacks Strategy (AD)
        • PrintNightmare
        • Token Impersonation
        • Domain Enumeration with Bloodhound
        • Domain Enumeration with ldapdomaindump
        • Domain Enumeration with Plumhound
        • Post-Compromise Enumeration Strategy
        • Dumping the NTDS.dit
        • Golden Ticket and Pass the Ticket Attacks
        • Post-Domain Compromise Attack Strategy
      • Methodology and SUPER IMPORTANT CONSIDERATIONS
      • Active Directory
      • Logical Active Directory components
      • Physical Active Directory components
    Home

    ❯

    Attacking Active Directory

    ❯

    Post Domain Compromise Attacks

    ❯

    Post-Domain Compromise Attack Strategy

    Post-Domain Compromise Attack Strategy

    Aug 26, 20241 min read

    • PEH

    Post-Domain Compromise Attack Strategy

    Our goals as penetration testers is to provide as much value for the client as possible:

    Related

    • Dumping the NTDS.dit
    • Golden Ticket and Pass the Ticket Attacks

    Graph View

    • Post-Domain Compromise Attack Strategy
    • Related

    Backlinks

    • Methodology and SUPER IMPORTANT CONSIDERATIONS
    • Welcome to ActiveNemesis

    • Linktree