Azure AD Connect |
|
Azure Enum |
|
Unconstrained Delegation |
|
Abuse Parent Child Domain Trusts |
|
Account Operators |
|
AD Recycle Bin |
|
ADCS |
|
AddKeyCredentialLink |
|
AddMember |
|
AddSelf |
|
ADFS |
|
ADIDNS |
|
AllowedToDelegate |
|
Alternate Data Stream |
|
Bloodhound |
|
Built-in Group |
|
Bypass ASMI |
|
Constrained Delegation |
|
Cross Session Relay |
|
dotnet |
|
DPAPI |
|
ExecuteDCOM |
|
File Transfer (Linux to Windows) |
|
File Transfer (Windows To Linux) |
|
File Transfer (Windows To Windows) |
|
Find (Windows) |
|
Firewall (Windows) |
|
ForceChangePassword |
|
GenericAll |
|
GenericWrite |
|
GetChanges/GetChangesAll |
|
GPOs |
|
IIS |
|
Kerberoasting |
|
Kerberos |
|
Krbrelayx |
|
LDAP |
|
Machine Account |
|
Metasploit |
|
Microsoft Access Database |
|
Microsoft Oulook Email Folder |
|
Monitor Process (Windows) |
|
MSSQL Agent Jobs |
|
MSSQL General |
|
MSSQL Linked Servers |
|
MSSQL Privilege Escalation |
|
NetExec (nxc) |
|
NTLM Relay Attack |
|
Persistence |
|
Phishing |
|
RBCD Attack |
|
RDP |
|
ReadGMSAPassword |
|
ReadLAPSPassword |
|
RPC |
|
Runas |
|
SCCM |
|
Scheduled tasks |
|
SeBackupPrivilege/SeRestorePrivilege |
|
secretsdump |
|
Secure String |
|
SeDebugPrivilege |
|
SeImpresonate |
|
SeLoadDriverPrivilege |
|
Silver Ticket |
|
SMB Enum |
|
SMB Server |
|
Volume Shadow Copies |
|
Windows ACLs |
|
Windows Defender |
|
Windows Event Logs |
|
Windows RPC |
|
Windows Services |
|
Winrm |
|
Winrm from Windows VM |
|
WriteDacl |
|
WriteOwner/Own |
|