1 -Network Propagation Introduction
2 -SITUATIONAL AWARENESS
3 -Enumerations with NetExec
3 -netexec.zip
4 -Vulnerability Checks with NetExec
5 -BloodHound 101
5 -bloodhound.zip
6 -BloodHound Setup I
7 -BloodHound Setup II
8 -BloodHound Data Ingestion
8 -rusthound.zip
9 -Enumerations with BloodHound
9 -bloodhound cypher query cheatsheet.zip
9 -bloohound cypher queries.zip
10 -PRIVILEGE ESCALATION
11 -Kerberoasting 101
12 -Privilege Escalation via Kerberoast Attack
12 -kerberoasting attack.zip
13 -Kerberos Delegations 101
14 -Unconstrained Delegation Overview
14 -kerberos unconstrained delegation.zip
14 -s4u2pwnage.zip
15 -Privilege Escalation via Unconstrained Delegation Attack
15 -exploiting unconstrained delegation.zip
15 -unconstrained delegation.zip
16 -Constrained Delegation Overview
17 -Privilege Escalation via Constrained Delegation Attack
18 -Resource-Based Constrained Delegation (RBCD) Overview
18 -kerberos resource-based constrained delegation computer object takeover.zip
19 -Privilege Escalation via Resource-Based Constrained Delegation Attack
20 -Resource-Based Constrained Delegation Attack Clean Up
21 -LATERAL MOVEMENT
22 -Lateral Movement via PS-Remoting
23 -Lateral Movement via Remote Desktop Protocol (RDP)
23 -enable restricted admin using powershell and use mimikatz for rdp.zip
24 -Lateral Movement via Pass-the-Ccache
25 -DOMAIN DOMINANCE
26 -Golden Ticket 101
26 -list of sids.zip
26 -sid filtering.zip
27 -Persistence via Golden Ticket Attack
28 -Silver Ticket 101
29 -Persistence via Silver Ticket Attack
30 -Diamond Ticket 101
30 -a diamond ticket in the ruff.zip
30 -diamond tickets.zip
31 -Persistence via Diamond Ticket Attack (High Privileged Account)
32 -Persistence via Diamond Ticket Attack (Low Privileged Account)
33 -Sapphire Ticket 101
33 -sapphire tickets.zip
34 -Persistence via Sapphire Ticket Attack
34 -sapphire tickets.zip
35 -Domain Trust 101
35 -trusts.zip
36 -Domain Trust Abuse via Golden Ticket Attack (Manual)
36 -sid-history injection.zip
37 -Domain Trust Abuse via Golden Ticket Attack (Automated)
38 -Domain Trust Abuse via Trust Key Attack
39 -Foreign Domain Group Membership 101 (I)
40 -Foreign Domain Group Membership 101 (II)
41 -Domain Trust Abuse via Foreign Group Membership Attack
42 -Domain Trust Abuse via Unconstrained Delegation Attack
43 -Credential Hunting I
44 -Credential Hunting II
45 -Credential Hunting III
46 -ACL Enumerations with BloodHound
46 -abusing active directory aclsaces.zip
46 -more on acls.zip
47 -Abusing ACL via ForceChangePassword Attack
48 -Abusing ACL via GenericWrite Attack
48 -shadow credentials.zip
49 -Abusing ACL via WriteDACL Attack
50 -Abusing ACL via AddSelf To Group Attack
51 -DCSync Attack
52 -Mapping Forest Trusts
53 -Active Directory Certificate Service 101
53 -certificate services (ad-cs).zip
54 -AD CS Vulnerability Enumerations with Certipy
55 -ESC1 Certificate Template Vulnerability Analysis 101
56 -Forest Trust Abuse via AD CS ESC1 Attack
57 -ESC2 Certificate Template Vulnerability Analysis 101
58 -Forest Trust Abuse via AD CS ESC2 Attack
59 -ESC4 Certificate Template Vulnerability Analysis 101
60 -Forest Trust Abuse via AD CS ESC4 Attack
61 -Forest Trust SID Hopping 101
61 -abusing inter-forest trust (forest, external).zip
62 -Cross Forest Trust Abuse via Golden Ticket Attack
63 -Cross Forest Trust Abuse via Trust Key Attack
64 -Network Propagation Module Summary