Reading List

Powersploit Documents page :

PowerSploitarrow-up-right

Kerberos :

Kerberos in Active Directoryarrow-up-right

winrs :

winrsarrow-up-right

Kerberos & Kerberoasting & Golden/Silver Tickets :

Kerberos Authentication Protocol - Active Directory Windows Server 2008arrow-up-right

Kerberoasting :

Kerberoastingarrow-up-right

LAPS :

https://docs.microsoft.com/en-us/previous-versions/mt227395(v=msdn.10)?redirectedfrom=MSDNarrow-up-right

What is Microsoft LAPS? | Local Administrator Password Solution | Manage Local Admin Passwordsarrow-up-right

List of SPNs and their functionality :

SPNsarrow-up-right

Kerberos Delegation :

Kerberos Delegationarrow-up-right

SID History and SID Filtering :

SID History and SID Filtering - Active Directory Windows Server 2008arrow-up-right

SID Filtering during AD Migrations - Active Directory FAQarrow-up-right

Group Policy :

Group Policy Architecture - Active Directory Windows Server 2008arrow-up-right

Group Policy Architecturearrow-up-right

Access Control List :

Access Control (Authorization) - Win32 appsarrow-up-right

Active Directory Permissions : Security Descriptorsarrow-up-right

Access Control Entriesarrow-up-right

Security Principals :

Security Principals (Windows 10) - Microsoft 365 Securityarrow-up-right

PSexec :

PsExec - Windows Sysinternalsarrow-up-right

Attack Defense & Detection :

Attack Defense & Detectionarrow-up-right

runas :

Runasarrow-up-right

xcopy :

https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/xcopyarrow-up-right

Database links

SQL Server - Link... Link... Link... and Shell: How to Hack Database Links in SQL Server!arrow-up-right

sp_configure :

sp_configure (Transact-SQL) - SQL Serverarrow-up-right

Active Directory Security Groups :

Active Directory Security Groups (Windows 10) - Microsoft 365 Securityarrow-up-right

bitsadmin :

BITSAdmin tool - Win32 appsarrow-up-right

PowerView README file :

PowerShellMafia/PowerSploitarrow-up-right

AMSI :

How AMSI helps you defend against malware - Win32 appsarrow-up-right

Antimalware Scan Interface reference - Win32 appsarrow-up-right

Hunting for AMSI bypasses - F-Secure Blogarrow-up-right

Mimikatz :

gentilkiwi/mimikatzarrow-up-right

Mimikatzarrow-up-right

BloodHound :

BloodHound: Six Degrees of Domain Admin - BloodHound 3.0.3 documentationarrow-up-right

Rubeus :

GhostPack/Rubeusarrow-up-right

MSSQL :

How-to make yourself a SYSADMIN on Microsoft SQL Server | News | Moninarrow-up-right

SofianeHamlaoui/Pentest-Notesarrow-up-right

Hacking SQL Server Stored Procedures - Part 1: (un)Trustworthy Databasesarrow-up-right

Microsoft SQL Serverarrow-up-right

1433 - Pentesting MSSQL - Microsoft SQL Serverarrow-up-right

MSSQLarrow-up-right

Last updated