Reading List
Powersploit Documents page :
Kerberos :
winrs :
Kerberos & Kerberoasting & Golden/Silver Tickets :
Kerberos Authentication Protocol - Active Directory Windows Server 2008
Kerberoasting :
LAPS :
https://docs.microsoft.com/en-us/previous-versions/mt227395(v=msdn.10)?redirectedfrom=MSDN
What is Microsoft LAPS? | Local Administrator Password Solution | Manage Local Admin Passwords
List of SPNs and their functionality :
Kerberos Delegation :
SID History and SID Filtering :
SID History and SID Filtering - Active Directory Windows Server 2008
SID Filtering during AD Migrations - Active Directory FAQ
Group Policy :
Group Policy Architecture - Active Directory Windows Server 2008
Access Control List :
Access Control (Authorization) - Win32 apps
Active Directory Permissions : Security Descriptors
Security Principals :
Security Principals (Windows 10) - Microsoft 365 Security
PSexec :
Attack Defense & Detection :
runas :
xcopy :
https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/xcopy
Database links
SQL Server - Link... Link... Link... and Shell: How to Hack Database Links in SQL Server!
sp_configure :
sp_configure (Transact-SQL) - SQL Server
Active Directory Security Groups :
Active Directory Security Groups (Windows 10) - Microsoft 365 Security
bitsadmin :
PowerView README file :
AMSI :
How AMSI helps you defend against malware - Win32 apps
Antimalware Scan Interface reference - Win32 apps
Hunting for AMSI bypasses - F-Secure Blog
Mimikatz :
BloodHound :
BloodHound: Six Degrees of Domain Admin - BloodHound 3.0.3 documentation
Rubeus :
MSSQL :
How-to make yourself a SYSADMIN on Microsoft SQL Server | News | Monin
Hacking SQL Server Stored Procedures - Part 1: (un)Trustworthy Databases
Last updated
Was this helpful?