From f0af3b4f4dc1c533ca81b5acc8188305e43ea59c Mon Sep 17 00:00:00 2001 From: OOP Date: Tue, 15 Oct 2019 23:18:07 +0700 Subject: [PATCH] Update Active Directory Attack.md --- Methodology and Resources/Active Directory Attack.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Methodology and Resources/Active Directory Attack.md b/Methodology and Resources/Active Directory Attack.md index f48597e..3b79012 100644 --- a/Methodology and Resources/Active Directory Attack.md +++ b/Methodology and Resources/Active Directory Attack.md @@ -458,7 +458,7 @@ Converting kirbi => ccache ### Pass-the-Ticket Silver Tickets -Forging a TGS require machine accound password (key) from the KDC +Forging a TGS require machine accound password (key) or NTLM hash from the KDC ```powershell # Create a ticket for the service @@ -988,4 +988,4 @@ PXE allows a workstation to boot from the network by retrieving an operating sys * [Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory - 28 January 2019 - Elad Shami](https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html) * [[PrivExchange] From user to domain admin in less than 60sec ! - davy](http://blog.randorisec.fr/privexchange-from-user-to-domain-admin-in-less-than-60sec/) * [Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy - March 16, 2017 - harmj0y](http://www.harmj0y.net/blog/redteaming/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy/) -* [Kerberos (II): How to attack Kerberos? - June 4, 2019 - ELOY PÉREZ](https://www.tarlogic.com/en/blog/how-to-attack-kerberos/) \ No newline at end of file +* [Kerberos (II): How to attack Kerberos? - June 4, 2019 - ELOY PÉREZ](https://www.tarlogic.com/en/blog/how-to-attack-kerberos/)