Web Security Learning
stable
Content Index:
1. Prologue
2. Computer Networks and Protocols
3. Information Collection
4. Common vulnerability attack and defense
5. Language and Framework
6. Intranet penetration
6.1. Windows Intranet Penetration
6.1.1. Information collection
6.1.2. Persistence
6.1.3. Privilege
6.1.4. Trace cleaning
6.1.5. Lateral movement
6.1.6. Domain penetration
6.1.6.1. Users
6.1.6.2. Intranet protocols
6.1.6.3. Domains
6.1.6.4. Active Directory
6.1.6.5. Group Policy
6.1.6.6. Windows implementation of Kerberos
6.1.6.7. Attack Types
6.2. Linux Intranet Penetration
6.3. Backdoor Technology
6.4. General Skills
6.5. Reference Links
7. Cloud Security
8. Defense Technology
9. Authentication Mechanism
10. Tools and Resources
11. Manual Quick Check
12. Others
Web Security Learning
»
6.
Intranet penetration
»
6.1.
Windows Intranet Penetration
»
6.1.6.
Domain penetration
6.1.6.
Domain penetration
¶
Content Index:
6.1.6.1. Users
6.1.6.1.1. User Groups and Workgroups
6.1.6.1.2. Domain Users
6.1.6.1.3. Group Policy
6.1.6.2. Intranet protocols
6.1.6.2.1. NetBIOS
6.1.6.2.2. LLMNR
6.1.6.2.3. mDNS
6.1.6.2.4. WPAD
6.1.6.3. Domains
6.1.6.3.1. Domain structure
6.1.6.3.2. Domain Controllers
6.1.6.3.3. Trust
6.1.6.3.4. OU
6.1.6.4. Active Directory
6.1.6.4.1. ADDS
6.1.6.4.2. Namespaces
6.1.6.4.3. Objects and Properties
6.1.6.5. Group Policy
6.1.6.5.1. Introduction
6.1.6.5.2. Common concepts
6.1.6.6. Windows implementation of Kerberos
6.1.6.6.1. Related Definitions
6.1.6.7. Attack Types
6.1.6.7.1. Golden Notes Utilization
6.1.6.7.2. Utilization of silver notes
6.1.6.7.3. DCSync Attack
6.1.6.7.4. DCShadow attack
6.1.6.7.5. Pass-the-Hash (PTH)
6.1.6.7.6. Passing Ticket Attacks
6.1.6.7.7. Kerberoasting Attacks
6.1.6.7.8. Kerberos Delegation Attacks
6.1.6.7.9. Other exploits