<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Active Directory &#8211; \x44\x61\x6e\x6b</title>
	<atom:link href="/category/active-directory/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Dank adventures in security</description>
	<lastBuildDate>Mon, 27 Mar 2023 05:25:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.1.1</generator>
	<item>
		<title>Cheatsheet &#8211; Active Directory Pentesting</title>
		<link>/2021/07/19/cheatsheet-active-directory-pentesting/</link>
					<comments>/2021/07/19/cheatsheet-active-directory-pentesting/#respond</comments>
		
		<dc:creator><![CDATA[Dank]]></dc:creator>
		<pubDate>Mon, 19 Jul 2021 10:24:02 +0000</pubDate>
				<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Cheat Sheet]]></category>
		<category><![CDATA[active directory]]></category>
		<category><![CDATA[cheatsheet]]></category>
		<guid isPermaLink="false">/blog/?p=53</guid>

					<description><![CDATA[A living cheatsheet of commands and tips i've encountered during my day to day which are good enough to share :)]]></description>
										<content:encoded><![CDATA[
<p class="has-large-font-size"><strong>Top cheat sheet resources:</strong></p>



<ul><li>https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet</li><li>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md</li><li>https://book.hacktricks.xyz/windows/active-directory-methodology</li><li>https://github.com/infosecn1nja/AD-Attack-Defense</li><li>https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet</li></ul>



<p class="has-large-font-size"><strong>ACL/ACE Abuse Resources:</strong></p>



<ul><li>https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces</li></ul>



<p class="has-large-font-size"><strong>To Review:</strong></p>



<ul><li>http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/</li><li>https://adsecurity.org/?p=2011</li><li>https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html#unconstrained-delegation</li><li>https://sixdub.medium.com/derivative-local-admin-cdd09445aac8</li><li>https://exploit.ph/powerview.html</li><li>https://exploit.ph/user-constrained-delegation.html</li><li>https://exploit.ph/revisiting-delegate-2-thyself.html</li><li>https://swarm.ptsecurity.com/kerberoasting-without-spns/</li><li>https://www.aisp.sg/document/CRESTConSpeaker/Delegate_or_Escalate.pdf</li></ul>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>/2021/07/19/cheatsheet-active-directory-pentesting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
