Breakme Wiki
search
⌘Ctrlk
Breakme Wiki
  • Index
    • Active Directory
    • Windows
    • Privilege Escalation
    • Hacking AD
      • 1 - Manual Enumeration
      • 2 - Sharphound + BloodHound
      • 3 - Authentication Attack
        • Dump NTLM Hashes from Memory
        • Crack or Pass NTLM hashes
        • Abuse Net-NTLMv2 Protocol (Crack or Relay)
        • Password Spraying
        • AS-REP Roasting
        • Kerberoasting
        • Silver Ticket Forgery
        • Domain Controllers Synchronization Attack
      • 4 - Lateral Movement
      • 5 - Persistence
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Indexchevron-right
  2. Hacking AD

3 - Authentication Attack

We focus on attacking NTLM and Kerberos.

Dump NTLM Hashes from Memorychevron-rightCrack or Pass NTLM hasheschevron-rightAbuse Net-NTLMv2 Protocol (Crack or Relay)chevron-rightPassword Sprayingchevron-rightAS-REP Roastingchevron-rightKerberoastingchevron-rightSilver Ticket Forgerychevron-rightDomain Controllers Synchronization Attackchevron-right
Previous2 - Sharphound + BloodHoundchevron-leftNextDump NTLM Hashes from Memorychevron-right