🧠
Marco’s Knowledge Hub
CtrlK
ResumePentestingMalware AnalysisCTF Writeups
  • 👨‍💻About Me
  • 💼Resume
  • ⚒️PENTESTING
    • Foundational
    • Reconnaissance
    • Scanning and Enumeration
    • Privilege Escalation
    • Defense Evasion
    • Attacking Services
    • Attacking Active Directory
      • Initial Attack Vectors
      • Post-Compromise Enumeration
      • Post-Compromise Attacks
      • Post-Domain Compromise Attacks
        • Dumping the NTDS.dit
        • Golden Ticket Attacks
      • Post Exploitation
    • Toolkit
    • Web Application Hacking
  • 👽MALWARE ANALYSIS
    • Malware Analysis Primer
    • Malware Types
    • Analyzing Malicious Windows Programs
    • Static Analysis
    • Reverse Engineering
    • Dynamic Analysis
    • Detecting Malware
  • 🏹THREAT HUNTING
    • Foundational
    • APTs
  • 🐍PROGRAMMING & SCRIPTING
    • Foundational
    • C Programming
    • Assembly Language
    • Bash
    • Python
    • Regular Expressions
    • SQL
  • 🕵️DIGITAL FORENSICS
    • Anti-Forensic Techniques
    • 🪟Windows Security Internals
  • 💼GRC (CISSP Notes)
    • Security Assessment and Testing
    • Security Governance Principles
    • Security Policies Standards and Procedures
    • Preventing and Responding to Incidents
    • Organizational Roles and Responsibilities
    • Organizational Processes
  • 📦Networking
    • Foundational
    • Wireless Technologies
  • 🧩CTF Writeups
    • HTB
Powered by GitBook
On this page
  1. ⚒️PENTESTING
  2. Attacking Active Directory

Post-Domain Compromise Attacks

Dumping the NTDS.ditGolden Ticket Attacks
PreviousMimikatzNextDumping the NTDS.dit