active directory 20
- VL Puppet
- VL Cicada
- VL Lustrous2
- VL Intercept
- VL Shinra Part 3 - Initial Payload Design, Host Enumeration & getting SYSTEM
- VL Shinra Part 2 - Enumerate, Enumerate, Enumerate!
- SQLi, LFI to RCE and Unintended Privesc via XAMLX & Impersonation – StreamIO @ HackTheBox
- Resource-Based Constrained Delegation - Resourced @ PG-Practice
- Active Directory, JEA & Random Stuff – Acute @ HackTheBox
- ASP, Windows Containers, Responder & NoPAC - Anubis @ HackTheBox
- Lab - Baby Walkthrough
- About Kerberos Silver Tickets
- Lab - Lustrous Walkthrough
- Stealing Hashes with Responder, GPO Permissions & Unintended Ways - Vault @ PG Practice
- Password Spraying, gMSA, ADIDNS & Constrained Delegation - Intelligence @ HackTheBox
- Active Directory, Reverse Engineering & Unintended Solutions - Pivotapi @ HackTheBox
- Monteverde @ HackTheBox
- P.O.O. Endgame @ HackTheBox
- Resolute @ HackTheBox
- Forest @ HackTheBox