📖
Building a Windows AD lab
search
Ctrlk
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the labchevron-right
    • Attack Pathschevron-right
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attackschevron-right
    • Active Directory Attackschevron-right
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attackschevron-right
      • DACL-Abuseschevron-right
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)chevron-right
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)chevron-right
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forestschevron-right
    • Miscchevron-right
    • Template page
  • Defence
    • Detection
    • Hardeningchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Vulnerabilities & Misconfigurations & Attackschevron-right
  2. Active Directory Attackschevron-right
  3. Priviliged Groups (todo)

Server Operators (todo)

PreviousBackup Operatorschevron-leftNextHopping domains and forestschevron-right

Last updated 3 years ago