The Hacker Recipes
GitHubTwitterExegolTools
Search…
Introduction
Active Directory
Reconnaissance
Movement
Credentials
Dumping
SAM & LSA secrets
DPAPI secrets
NTDS secrets
LSASS secrets
DCSync
Group Policy Preferences
Network shares
Network protocols
Web browsers
In-memory secrets
🛠️ Cached Kerberos tickets
🛠️ Windows Credential Manager
🛠️ Local files
🛠️ Password managers
Cracking
Bruteforcing
Shuffling
Impersonation
MITM and coerced auths
NTLM
Kerberos
DACL abuse
Group policies
🛠️ Trusts
Built-ins & settings
Netlogon
Certificate Services (AD-CS)
Exchange services
Print Spooler Service
Persistence
Web services
Reconnaissance
Configuration
Accounts and sessions
User inputs
Systems & services
Reconnaissance
Movement
Privilege escalation
Pivoting
🛠️ Physical
Locks
Networking
Machines
Super secret zones
🛠️ Intelligence gathering
CYBINT
OSINT
GEOINT
🛠️ RADIO
RFID
Bluetooth
Wi-Fi
Wireless keyboard/mouse
🛠️ mobile apps
Android
iOS
Powered By GitBook
🛠️ Password managers
​
Previous
🛠️ Local files
Next
Cracking
Copy link