# Active-Directory-Exploitation-Cheat-Sheet **Repository Path**: csharphpython/Active-Directory-Exploitation-Cheat-Sheet ## Basic Information - **Project Name**: Active-Directory-Exploitation-Cheat-Sheet - **Description**: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-10-17 - **Last Updated**: 2021-10-16 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Active Directory Cheat Sheet This repository contains a general methodology in the Active Directory environment. It is offered with a selection of quick commands from the most efficient tools based on Powershell, C, .Net 3.5 and .Net 4.5. --- #### General Process: - Recon - Domain Enum - Local Privilege Escalation - Local Account Stealing - Monitor Potential Incomming Account - Local Account Stealing - Admin Recon - Lateral Mouvement - Remote Administration - Domain Admin Privileges - Cross Trust Attacks - Persistance and Exfiltrate #### Active Directory Kill Chain: ![Process](process.jpeg "Active Directory Kill Chain") #### Cheat Sheet Tree: - [/A - Recon](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/A%20-%20Recon/README.md) - [/B - Domain Enum](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/B%20-%20Domain%20Enum/README.md) - [/C - Local Privilege Escalation](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/C%20-%20Local%20Privilege%20Escalation/README.md) - [/D - User Hunting](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/D%20-%20User%20Hunting/README.md) - [/E - Monitor Potential Incomming Account](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/E%20-%20Monitor%20Potential%20Incomming%20Account/README.md) - [/F - BloodHound](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/F%20-%20BloodHound/README.md) - [/G - Lateral Mouvement](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/G%20-%20Lateral%20Mouvement/README.md) - [/H - Persistence](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/H%20-%20Persistence/README.md) - [/I - Domain Admin Privileges](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/I%20-%20Domain%20Admin%20Privileges/README.md) - [/J - Cross Trust Attacks](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/J%20-%20Cross%20Trust%20Attacks/README.md) - [/K - Database Hunting](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/K%20-%20Database%20Hunting/README.md) - [/L - Security Downgrade](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/L%20-%20Security%20Downgrade/README.md) - [/M - Privileged Accounts and Groups in Active Directory](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/M%20-%20Privileged%20Accounts%20and%20Groups%20in%20Active%20Directory/README.md) - [/N - Data Exfiltration](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/N%20-%20Data%20Exfiltration/README.md) :construction_worker: - [/X - Reverse PSShell FUD](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/X%20-%20Reverse%20PSShell%20FUD/README.md) - [/Y - UL-DL-EXEC Skills](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/Y%20-%20UL-DL-EXEC%20Skills/README.md) - [/Z - Tool Box](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/tree/master/Z%20-%20Tool%20Box) --- #### Contribution, Proposal, Issue: - [ISSUE TEMPLATE](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet/blob/master/.github/ISSUE_TEMPLATE/feature_request.md) - MAIL: contact@integration-it.fr