AD - Pages v0.8
parent
a70ff1543d
commit
269dc8c971
|
@ -1,4 +1,4 @@
|
||||||
# Active Directory - Access Controls
|
# Active Directory - Access Controls ACL/ACE
|
||||||
|
|
||||||
* ACL: Access Control Lists
|
* ACL: Access Control Lists
|
||||||
* ACE: Access Control Entry
|
* ACE: Access Control Entry
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Linux Active Directory
|
# Active Directory - Linux
|
||||||
|
|
||||||
## CCACHE ticket reuse from /tmp
|
## CCACHE ticket reuse from /tmp
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Active Directory - Dumping NTDS
|
# Active Directory - NTDS Dumping
|
||||||
|
|
||||||
You will need the following files to extract the ntds :
|
You will need the following files to extract the ntds :
|
||||||
- NTDS.dit file
|
- NTDS.dit file
|
|
@ -1,4 +1,4 @@
|
||||||
# RODC - Read Only Domain Controller
|
# Active Directory - Read Only Domain Controller
|
||||||
|
|
||||||
RODCs are an alternative for Domain Controllers in less secure physical locations
|
RODCs are an alternative for Domain Controllers in less secure physical locations
|
||||||
- Contains a filtered copy of AD (LAPS and Bitlocker keys are excluded)
|
- Contains a filtered copy of AD (LAPS and Bitlocker keys are excluded)
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Active Directory Integrated DNS
|
# Active Directory - Integrated DNS - ADIDNS
|
||||||
|
|
||||||
ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic. Active Directory will need some time (~180 seconds) to sync LDAP changes via its DNS dynamic updates protocol.
|
ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic. Active Directory will need some time (~180 seconds) to sync LDAP changes via its DNS dynamic updates protocol.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Active Directory Tricks
|
# Active Directory - Tricks
|
||||||
|
|
||||||
## Kerberos Clock Synchronization
|
## Kerberos Clock Synchronization
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Internal - Man-in-the-Middle and Relay
|
# Internal - MITM and Relay
|
||||||
|
|
||||||
NTLMv1 and NTLMv2 can be relayed to connect to another machine.
|
NTLMv1 and NTLMv2 can be relayed to connect to another machine.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
## Kerberos - Bronze Bit
|
# Kerberos - Bronze Bit
|
||||||
|
|
||||||
CVE-2020-17049
|
CVE-2020-17049
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue