🐻
jotter's den
search
Ctrlk
  • 🐻jotter's den
  • diagram-projectNetwork
    • External Recon
    • Internal Recon
    • Wireless Attacks
    • Common Protocolschevron-right
    • Linux Privilege Escalationchevron-right
    • Windows Privilege Escalationchevron-right
  • landmark-flagActive Directory
    • Initial Accesschevron-right
    • AD Certificate Serviceschevron-right
    • Post-Exploitationchevron-right
      • LSASS and SAM
      • Kerberos Tickets
      • DPAPI, Browser Cookies, and CredMan
      • Pivoting to Entra
      • Other Targets
  • cloudCloud
    • Azure/O365chevron-right
    • AWSchevron-right
    • GCP
  • spiderMalware and Evasion
    • Shellcode Loader Guidelines
    • UAC Bypasses
    • AppLocker
    • Anti-Forensicschevron-right
  • globeWeb
    • XSS / CSRF
    • IIS Servers
  • codeBinary Exploitation
    • Reversing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. landmark-flagActive Directory

Post-Exploitation

LSASS and SAMchevron-rightKerberos Ticketschevron-rightDPAPI, Browser Cookies, and CredManchevron-rightPivoting to Entrachevron-rightOther Targetschevron-right
PreviousCertificate Authenticationchevron-leftNextLSASS and SAMchevron-right