Skip to content

Latest commit

 

History

History
56 lines (41 loc) · 4.26 KB

File metadata and controls

56 lines (41 loc) · 4.26 KB

Configuring

Complete the "Configuration" part of each of these pages to build the second attack path of the lab. Completing the "Attacking" part is NOT Required! These are added to give as an example on how the misconfigurations could be exploited.

{% hint style="info" %} We recommend completing the pages in order. {% endhint %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/enumerate-logins/" %} enumerate-logins {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/initial-access-attacks/username-enumeration/as-rep-roasting.md" %} as-rep-roasting.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/initial-access/normal-domain-user-access.md" %} normal-domain-user-access.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/impersonation.md" %} impersonation.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/db-owner.md" %} db-owner.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/executing-commands.md" %} executing-commands.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/delegation-attacks/resource-based-constrained-delegation/resource-based-constrained-delegation.md" %} resource-based-constrained-delegation.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/database-links.md" %} database-links.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/capturing-hashes-and-relaying.md" %} capturing-hashes-and-relaying.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/acl-abuses/page-2.md" %} page-2.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/misc/different-methods-of-dumping-credentials/page-3.md" %} page-3.md {% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/priviliged-groups/backup-operators.md" %} backup-operators.md {% endcontent-ref %}