🐻
jotter's den
Ctrlk
  • 🐻jotter's den
  • Network
    • External Recon
    • Internal Recon
    • Wireless Attacks
    • Common Protocols
    • Linux Privilege Escalation
    • Windows Privilege Escalation
  • Active Directory
    • Initial Access
    • AD Certificate Services
    • Post-Exploitation
      • LSASS and SAM
      • Kerberos Tickets
      • DPAPI, Browser Cookies, and CredMan
      • Pivoting to Entra
      • Other Targets
  • Cloud
    • Azure/O365
    • AWS
    • GCP
  • Malware and Evasion
    • Shellcode Loader Guidelines
    • UAC Bypasses
    • AppLocker
    • Anti-Forensics
  • Web
    • XSS / CSRF
    • IIS Servers
  • Binary Exploitation
    • Reversing
Powered by GitBook
On this page
  1. Active Directory

Post-Exploitation

LSASS and SAMKerberos TicketsDPAPI, Browser Cookies, and CredManPivoting to EntraOther Targets
PreviousCertificate AuthenticationNextLSASS and SAM