# Configuring

Complete the "Configuration" part of each of these pages to build the second attack path of the lab. Completing the "Attacking" part is NOT Required! These are added to give as an example on how the misconfigurations could be exploited.

{% hint style="info" %}
We recommend completing the pages in order.
{% endhint %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/enumerate-logins" %}
[enumerate-logins](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/enumerate-logins)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/initial-access-attacks/username-enumeration/as-rep-roasting" %}
[as-rep-roasting](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/initial-access-attacks/username-enumeration/as-rep-roasting)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/initial-access/normal-domain-user-access" %}
[normal-domain-user-access](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/initial-access/normal-domain-user-access)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/impersonation" %}
[impersonation](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/impersonation)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/db-owner" %}
[db-owner](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/privilege-escalation/db-owner)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/executing-commands" %}
[executing-commands](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/executing-commands)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/delegation-attacks/resource-based-constrained-delegation/resource-based-constrained-delegation" %}
[resource-based-constrained-delegation](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/delegation-attacks/resource-based-constrained-delegation/resource-based-constrained-delegation)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/database-links" %}
[database-links](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/database-links)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/capturing-hashes-and-relaying" %}
[capturing-hashes-and-relaying](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/sql-server-attacks/capturing-hashes-and-relaying)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/acl-abuses/page-2" %}
[page-2](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/acl-abuses/page-2)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/misc/different-methods-of-dumping-credentials/page-3" %}
[page-3](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/misc/different-methods-of-dumping-credentials/page-3)
{% endcontent-ref %}

{% content-ref url="../../../vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/priviliged-groups/backup-operators" %}
[backup-operators](https://ad-lab.gitbook.io/building-a-windows-ad-lab/vulnerabilities-and-misconfigurations-and-attacks/active-directory-attacks/priviliged-groups/backup-operators)
{% endcontent-ref %}
