☠️
Pentesting Articles and Notes
search
Ctrlk
  • Welcome!
  • Windows
    • Active Directorychevron-right
      • Kerberos Authentication
      • Enumerationchevron-right
      • Credential Dumpingchevron-right
      • Privilege Escalationchevron-right
      • Persistencechevron-right
        • Abusing ACLs
        • AdminSDHolder
        • Custom Security Service Providers (SSP's)
        • Directory Services Restore Mode (DSRM)
        • Modifying Remote Protocol Security Descriptors
        • Golden Tickets
        • Silver Tickets
        • Skeleton Keys
      • Powershell Remoting
      • Lateral Movementchevron-right
  • Coding
    • Pentesting With Pythonchevron-right
  • Network Attacks
    • Man-In-The-Middle Attackschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Windowschevron-right
  2. Active Directory

Persistence

Methods to maintain persistence in an AD environment.

Abusing ACLschevron-rightAdminSDHolderchevron-rightCustom Security Service Providers (SSP's)chevron-rightDirectory Services Restore Mode (DSRM)chevron-rightModifying Remote Protocol Security Descriptorschevron-rightGolden Ticketschevron-rightSilver Ticketschevron-rightSkeleton Keyschevron-right
PreviousConstrained Delegationchevron-leftNextAbusing ACLschevron-right

Last updated 3 years ago