The Hacker Recipes
The Hacker Recipes
GitHub
Twitter
Introduction
Active Directory (AD-DS)
Recon
Movement
Credentials
Dumping
Cracking
Bruteforcing
Shuffling
Impersonation
Coerced authentications
LM and NTLM
Kerberos
Access Control Entries (ACEs)
Group Policy Objects (GPOs)
Domain settings
🛠️ Domain trusts
🛠️ Privileged groups
🛠️ Netlogon
🛠️ Frontal attacks
🛠️ Persistence
Web services
Recon
🛠️ Configuration
Accounts and sessions
Inputs
🛠️ Servers
Port scanning
Abusing services
Privilege escalation
Pivoting
🛠️ Intelligence gathering
CYBINT
OSINT
GEOINT
🛠️ Physical
Keylogging
HID injection
Attacks on drives
Lockpicking
🛠️ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
Powered by GitBook

Credentials

Here are the articles in this section:
Dumping
MITRE ATT&CK™ Techniques T1003 and T1552
Cracking
MITRE ATT&CK™ Sub-technique T1110.002
Bruteforcing
Shuffling
MITRE ATT&CK™ Techniques T1003 and T1552 (kind of)
Impersonation
Active Directory (AD-DS) - Previous
Movement
Next
Dumping
Last updated 7 hours ago
Edit on GitHub