Apuntes Ciberseguridad (Cibaism)
Ctrlk
HTBGitHubLinkedInNotion (Writeups)
  • Welcome to My Digital Garden
  • About me
  • Hacking notes (Personal)
    • Tratamiento TTY
    • Hacking Web Tecniques
    • Linux Privilage Escalation
    • Active Directory
    • Ligolo
  • Hacking Notes (Learning Path)
    • (HTB) Penetration Tester
      • Getting Started
      • Footprinting
      • Introduction to Active Directory Enumeration & Attacks
        • Tools of the Trade
        • Initial enumeration
          • External Recon and Enumeration Principles
          • Initial Enumeration of the Domain
        • Sniffing out a Foothold
        • Sighting In, Hunting For A User
        • Spray Responsibly
        • Deeper Down for Rabbit Holes
      • File Inclusion
      • SQLMAP Essentials
    • (CRTA) Red Team Analyst
    • (eJPT) Junior Penetration Tester
    • (CRT-COI) Certified Red Team CredOps infiltrator
  • Blue team notes
    • Digital Forensics
    • (Falcon) CrowdStrike
  • Programming
    • Powershell
Powered by GitBook
On this page
  1. Hacking Notes (Learning Path)
  2. (HTB) Penetration Tester
  3. Introduction to Active Directory Enumeration & Attacks

Initial enumeration

External Recon and Enumeration PrinciplesInitial Enumeration of the Domain
PreviousTools of the TradeNextExternal Recon and Enumeration Principles