Breakme Wiki
Ctrlk
  • Index
    • Active Directory
    • Windows
    • Privilege Escalation
    • Hacking AD
      • 1 - Manual Enumeration
      • 2 - Sharphound + BloodHound
      • 3 - Authentication Attack
        • Dump NTLM Hashes from Memory
        • Crack or Pass NTLM hashes
        • Abuse Net-NTLMv2 Protocol (Crack or Relay)
        • Password Spraying
        • AS-REP Roasting
        • Kerberoasting
        • Silver Ticket Forgery
        • Domain Controllers Synchronization Attack
      • 4 - Lateral Movement
      • 5 - Persistence
Powered by GitBook
On this page
  1. Index
  2. Hacking AD

3 - Authentication Attack

We focus on attacking NTLM and Kerberos.

Dump NTLM Hashes from MemoryCrack or Pass NTLM hashesAbuse Net-NTLMv2 Protocol (Crack or Relay)Password SprayingAS-REP RoastingKerberoastingSilver Ticket ForgeryDomain Controllers Synchronization Attack
Previous2 - Sharphound + BloodHoundNextDump NTLM Hashes from Memory