<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Active-Directory on MrAzoth</title>
    <link>https://az0th.it/tags/active-directory/</link>
    <description>Recent content in Active-Directory on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <atom:link href="https://az0th.it/tags/active-directory/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Enumeration &amp; Discovery — From Kali</title>
      <link>https://az0th.it/ad/kali/enumeration/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/enumeration/</guid>
      <description>Comprehensive Active Directory enumeration from a Kali/Linux attacker host: port scanning, DNS, LDAP, BloodHound, Kerbrute, NetExec, rpcclient, windapsearch, and more.</description>
    </item>
    <item>
      <title>Delegation Attacks — From Windows</title>
      <link>https://az0th.it/ad/windows/delegation-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/delegation-attacks/</guid>
      <description>Abusing Kerberos delegation (Unconstrained, Constrained, RBCD, Shadow Credentials) from a Windows foothold using Rubeus, PowerView, and PowerMad.</description>
    </item>
    <item>
      <title>Domain &amp; Forest Trusts — From Windows</title>
      <link>https://az0th.it/ad/windows/domain-trusts/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/domain-trusts/</guid>
      <description>Enumerating and exploiting Active Directory domain and forest trusts from a Windows foothold: SID history injection, golden ticket cross-domain, inter-realm key abuse.</description>
    </item>
    <item>
      <title>Persistence — From Windows</title>
      <link>https://az0th.it/ad/windows/persistence/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/persistence/</guid>
      <description>Domain persistence techniques after AD compromise: Golden/Silver/Diamond Tickets, DCSync backdoors, AdminSDHolder, ACL abuse, WMI subscriptions, and DPAPI backup keys.</description>
    </item>
    <item>
      <title>AD CS Attacks — From Kali</title>
      <link>https://az0th.it/ad/kali/adcs-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/kali/adcs-attacks/</guid>
      <description>Active Directory Certificate Services exploitation from Kali: ESC1-ESC8, Certipy enumeration, certificate request abuse, NTLM relay to CA, and Pass-the-Certificate.</description>
    </item>
    <item>
      <title>AD CS Attacks — From Windows</title>
      <link>https://az0th.it/ad/windows/adcs-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/ad/windows/adcs-attacks/</guid>
      <description>Active Directory Certificate Services exploitation from Windows: ESC1-ESC8 with Certify, ForgeCert, Rubeus, and Pass-the-Certificate.</description>
    </item>
  </channel>
</rss>
