Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

Active Directory Enumeration with PowerShell

Cyber Document By Haboob Team

in Document, Paper
1 min read

INTRODUCTION
Nowadays, most of the environments are using Active Directory to manage their networks and resources. And over the past years, the attackers have been focused to abuse and attack the Active Directory environments using different techniques and methodologies. So in this research paper, we are going to use the power of the PowerShell to enumerate the resources of the Active Directory, like enumerating the domains, users, groups, ACL, GPOs, domain trusts also hunting the users and the domain admins. With this valuable information, we can increase our attack surface to abuse the AD like Privilege escalation, lateral movements and persistence and so on.

WHY POWERSHELL?
Penetration Tests and Red Team operations for secured environments need altered approaches. You cannot afford to touch disk, throw executable and use memory corruption exploits without the risk of being ineffective as a simulated adversary. To enhance offensive tactics and methodologies, PowerShell is the tool of choice. PowerShell has changed the way Windows networks are attacked. It is Microsoft’s shell and scripting language available by default in all modern Windows computers. It could interact with .Net, WMI, COM, Windows API, Registry and other computers on a Windows Domain. This makes it imperative for Penetration Testers and Red Teamers to learn PowerShell.

 

DOWNLOAD DOCUMENT

Tags: Cyber ReportDocumentHabocPaper
17
VIEWS

More Papers

DOCUMENT: How to Categorize Risk in IoT
Paper

DOCUMENT: How to Categorize Risk in IoT

February 21, 2021

The purpose of this paper is to help readers understand the various attributes of Internet of Things (IoT) devices and...

Paper: Phishing: An Analysis of a Growing Problem
Paper

Paper: Phishing: An Analysis of a Growing Problem

January 28, 2021

Email has become an invaluable communication tool for both business and personal use.

Paper: A Review on Phishing Attacks and Various Anti Phishing Techniques
Paper

Paper: A Review on Phishing Attacks and Various Anti Phishing Techniques

January 27, 2021

Phishing attacks are an extremely common attack vector that have been used for many years, and the potential impacts and...

MORE

Software

Arachni

December 29, 2020
Movie

Terminator 2: Judgment Day (1991)

September 28, 2020
Book

BOOK: The Amazon Way on IoT: 10 Principles for Every Leader from the World’s Leading Internet of Things Strategies

February 20, 2021
Quote

QUOTE: “Blockchain’s characteristics do not provide an impenetrable panacea to all cyber ills…”

February 28, 2021
ADVERTISEMENT

Tags

Books Cyber Definition Cybersecurity Hackers Malware Memes Movies Quantum Computing Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.