AD - Pages v0.8

pull/2/head
Swissky 2023-12-03 23:11:27 +01:00
parent a70ff1543d
commit 269dc8c971
8 changed files with 8 additions and 8 deletions

View File

@ -1,4 +1,4 @@
# Active Directory - Access Controls # Active Directory - Access Controls ACL/ACE
* ACL: Access Control Lists * ACL: Access Control Lists
* ACE: Access Control Entry * ACE: Access Control Entry

View File

@ -1,4 +1,4 @@
# Linux Active Directory # Active Directory - Linux
## CCACHE ticket reuse from /tmp ## CCACHE ticket reuse from /tmp

View File

@ -1,4 +1,4 @@
# Active Directory - Dumping NTDS # Active Directory - NTDS Dumping
You will need the following files to extract the ntds : You will need the following files to extract the ntds :
- NTDS.dit file - NTDS.dit file

View File

@ -1,4 +1,4 @@
# RODC - Read Only Domain Controller # Active Directory - Read Only Domain Controller
RODCs are an alternative for Domain Controllers in less secure physical locations RODCs are an alternative for Domain Controllers in less secure physical locations
- Contains a filtered copy of AD (LAPS and Bitlocker keys are excluded) - Contains a filtered copy of AD (LAPS and Bitlocker keys are excluded)

View File

@ -1,4 +1,4 @@
# Active Directory Integrated DNS # Active Directory - Integrated DNS - ADIDNS
ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic. Active Directory will need some time (~180 seconds) to sync LDAP changes via its DNS dynamic updates protocol. ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic. Active Directory will need some time (~180 seconds) to sync LDAP changes via its DNS dynamic updates protocol.

View File

@ -1,4 +1,4 @@
# Active Directory Tricks # Active Directory - Tricks
## Kerberos Clock Synchronization ## Kerberos Clock Synchronization

View File

@ -1,4 +1,4 @@
# Internal - Man-in-the-Middle and Relay # Internal - MITM and Relay
NTLMv1 and NTLMv2 can be relayed to connect to another machine. NTLMv1 and NTLMv2 can be relayed to connect to another machine.

View File

@ -1,4 +1,4 @@
## Kerberos - Bronze Bit # Kerberos - Bronze Bit
CVE-2020-17049 CVE-2020-17049