From 598751f7c6e901c71a4ce6750d55e967c446bc91 Mon Sep 17 00:00:00 2001 From: CravateRouge Date: Fri, 4 Nov 2022 14:43:20 +0100 Subject: [PATCH] Redirect duplicate --- Methodology and Resources/Active Directory Attack.md | 12 ++---------- 1 file changed, 2 insertions(+), 10 deletions(-) diff --git a/Methodology and Resources/Active Directory Attack.md b/Methodology and Resources/Active Directory Attack.md index 917bef7..75bb712 100644 --- a/Methodology and Resources/Active Directory Attack.md +++ b/Methodology and Resources/Active Directory Attack.md @@ -224,15 +224,7 @@ Use the correct collector * AzureHound for Azure Active Directory * SharpHound for local Active Directory -* use [AzureHound](https://posts.specterops.io/introducing-bloodhound-4-0-the-azure-update-9b2b26c5e350) - ```powershell - # require: Install-Module -name Az -AllowClobber - # require: Install-Module -name AzureADPreview -AllowClobber - Connect-AzureAD - Connect-AzAccount - . .\AzureHound.ps1 - Invoke-AzureHound - ``` +* use [AzureHound](https://github.com/BloodHoundAD/AzureHound) (more info: [Cloud - Azure Pentest](Cloud%20-%20Azure%20Pentest.md/#azure-recon-tools)) * use [BloodHound](https://github.com/BloodHoundAD/BloodHound) ```powershell @@ -4051,4 +4043,4 @@ CME 10.XXX.XXX.XXX:445 HOSTNAME-01 [+] DOMAIN\COMPUTER$ 31d6cfe0d16ae * [Sapphire tickets - The Hacker Recipes](https://www.thehacker.recipes/ad/movement/kerberos/forged-tickets/sapphire) * [Exploiting RBCD Using a Normal User Account - tiraniddo.dev - Friday, 13 May 2022](https://www.tiraniddo.dev/2022/05/exploiting-rbcd-using-normal-user.html) * [Exploring SCCM by Unobfuscating Network Access Accounts - @_xpn_ - Posted on 2022-07-09](https://blog.xpnsec.com/unobfuscating-network-access-accounts/) -* [.NET Advanced Code Auditing XmlSerializer Deserialization Vulnerability - April 2, 2019 by znlive](https://znlive.com/xmlserializer-deserialization-vulnerability) \ No newline at end of file +* [.NET Advanced Code Auditing XmlSerializer Deserialization Vulnerability - April 2, 2019 by znlive](https://znlive.com/xmlserializer-deserialization-vulnerability)