Skip to content

Latest commit

 

History

History
102 lines (78 loc) · 1.64 KB

File metadata and controls

102 lines (78 loc) · 1.64 KB
description coverY
Dive deep into our comprehensive article about Assumed Breach, a vital approach in cybersecurity. Learn its significance, advantages, and implementation strategies for improved security.
0

Pwning

Assumed Breach

After getting access into a machine we need to start understanding the system we are In!

---
title: CESP
---
mindmap
  root((RFS))
    Enumeration
      Machines
      Users & Groups
        Administrators
        Enterprise Admins
        CA Admins


    Certificates
      Working with<br/>Certificates
        Read Certificated Content
        Convert Certificate
      Kerberos
        Uses
            RBCD
            S4U2self
            PKINIT TGT
    Tools
      InvisiShell
      Certify

    Bypassing Defenses
      ConfuseX
      Loader

Loading

1 - Enumerate Local Machine (Student VM)

Organize all the common tools you use bypass any PowerShell restrictions and start Enumerating.

Remember the Enumeration focus is data to help us attack AD CS.

Common Enumeration

  • Local Users
  • Domain Users
  • Domain Machines
  • Local VM Restrictions
  • Where is the DC?
  • Where is the CA?

Local Users

// Some code

Domain Users

// Some code

Domain Machines

// Some code

Local VM Restrictions

// Some code

Where is the DC?

// Some code

Where is the CA?

// Some code