diff --git a/docs/active-directory/ad-adds-acl-ace.md b/docs/active-directory/ad-adds-acl-ace.md index 1737782..072c444 100644 --- a/docs/active-directory/ad-adds-acl-ace.md +++ b/docs/active-directory/ad-adds-acl-ace.md @@ -1,4 +1,4 @@ -# Active Directory - Access Controls +# Active Directory - Access Controls ACL/ACE * ACL: Access Control Lists * ACE: Access Control Entry diff --git a/docs/active-directory/ad-adds-linux.md b/docs/active-directory/ad-adds-linux.md index 29b1ee7..9e288af 100644 --- a/docs/active-directory/ad-adds-linux.md +++ b/docs/active-directory/ad-adds-linux.md @@ -1,4 +1,4 @@ -# Linux Active Directory +# Active Directory - Linux ## CCACHE ticket reuse from /tmp diff --git a/docs/active-directory/ad-adds-dumping-ntds.md b/docs/active-directory/ad-adds-ntds-dumping.md similarity index 99% rename from docs/active-directory/ad-adds-dumping-ntds.md rename to docs/active-directory/ad-adds-ntds-dumping.md index 3c3d5a6..54e9b83 100644 --- a/docs/active-directory/ad-adds-dumping-ntds.md +++ b/docs/active-directory/ad-adds-ntds-dumping.md @@ -1,4 +1,4 @@ -# Active Directory - Dumping NTDS +# Active Directory - NTDS Dumping You will need the following files to extract the ntds : - NTDS.dit file diff --git a/docs/active-directory/ad-adds-rodc.md b/docs/active-directory/ad-adds-rodc.md index fcc6b06..34c86a2 100644 --- a/docs/active-directory/ad-adds-rodc.md +++ b/docs/active-directory/ad-adds-rodc.md @@ -1,4 +1,4 @@ -# RODC - Read Only Domain Controller +# Active Directory - Read Only Domain Controller RODCs are an alternative for Domain Controllers in less secure physical locations - Contains a filtered copy of AD (LAPS and Bitlocker keys are excluded) diff --git a/docs/active-directory/ad-integrated-dns.md b/docs/active-directory/ad-integrated-dns.md index 4573ad5..8a66a11 100644 --- a/docs/active-directory/ad-integrated-dns.md +++ b/docs/active-directory/ad-integrated-dns.md @@ -1,4 +1,4 @@ -# Active Directory Integrated DNS +# Active Directory - Integrated DNS - ADIDNS ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic. Active Directory will need some time (~180 seconds) to sync LDAP changes via its DNS dynamic updates protocol. diff --git a/docs/active-directory/ad-tricks.md b/docs/active-directory/ad-tricks.md index 81fd96a..67e8a7e 100644 --- a/docs/active-directory/ad-tricks.md +++ b/docs/active-directory/ad-tricks.md @@ -1,4 +1,4 @@ -# Active Directory Tricks +# Active Directory - Tricks ## Kerberos Clock Synchronization diff --git a/docs/active-directory/internal-mitm-relay.md b/docs/active-directory/internal-mitm-relay.md index b847440..0ee12f3 100644 --- a/docs/active-directory/internal-mitm-relay.md +++ b/docs/active-directory/internal-mitm-relay.md @@ -1,4 +1,4 @@ -# Internal - Man-in-the-Middle and Relay +# Internal - MITM and Relay NTLMv1 and NTLMv2 can be relayed to connect to another machine. diff --git a/docs/active-directory/kerberos-bronze-bit.md b/docs/active-directory/kerberos-bronze-bit.md index 8f31dec..542998e 100644 --- a/docs/active-directory/kerberos-bronze-bit.md +++ b/docs/active-directory/kerberos-bronze-bit.md @@ -1,4 +1,4 @@ -## Kerberos - Bronze Bit +# Kerberos - Bronze Bit CVE-2020-17049