Hackzzz - The Notebook
Ctrlk
  • โšกWelcome!
    • ๐Ÿ‘พHackzzz
    • ๐Ÿ“Writeups
    • ๐Ÿ”ฎGithub
    • ๐Ÿ“บYouTube Channel
  • Everything About and Notes
    • ๐ŸฅทFive stages of Ethical Hacking
    • ๐Ÿ”OSINT
    • ๐Ÿ‘๏ธNetwork Pentesting
    • ๐ŸชŸWindows and Active Directory
      • Windows Basic Commands
      • Active Directory
        • AD Enumeration
        • Man-In-The-Middle Attacks
        • Zerologon (2020-1472)
        • Password Cracking
        • Kerberoasting
        • Post-Compromise Enumeration
        • Post-Compromise attacks
          • Privilege Escalation
            • Token Impersonation
            • Print Nightmare (CVE-2021-1675)
          • Pass Attacks
          • Mimikatz
          • Dumping hashes (secretsdump)
      • Windows Privilege Escalation
      • Active Directory Exploitation Cheat Sheet
      • Active Directory Attacks (PayloadAllTheThings)
    • ๐Ÿง Social Engineering
    • ๐Ÿ•ธ๏ธWeb Pentesting
    • ๐Ÿ“กWireless Pentesting
    • ๐Ÿ”ฅBinary Explotation
    • ๐Ÿƒโ€โ™‚๏ธPivoting & Port-forwarding
    • ๐Ÿ“ฑMobile Application Pentesting
    • ๐ŸฆพArduino
    • ๐ŸŒExternal Pentesting
  • Gadgets
    • ๐Ÿ“‡Proxmark3
    • ๐Ÿ“กSDR Hacking
    • ๐ŸWI-FI Pineapple
  • ๐ŸšฉResources
    • ๐Ÿ™Extras
    • ๐ŸŸฆMetasploit
    • rc Personal Config (.bashrc && .zshrc)
    • WADCOMS
    • GTFOBins
    • LOLBAS
    • Devhints
    • Weakpass
    • Revshells
    • ๐Ÿ“‘Pentesting Reports Repo
Powered by GitBook
On this page
  1. Everything About and Notes
  2. ๐ŸชŸWindows and Active Directory
  3. Active Directory
  4. Post-Compromise attacks

Privilege Escalation

Token ImpersonationPrint Nightmare (CVE-2021-1675)
PreviousPost-Compromise attacksNextToken Impersonation

Last updated 3 years ago