Performing NTLM relay attacks using SMB and LDAP.
Category: Infrastructure
Credential Interception Using Malicious SMB Shares
How to intercept NTLM-SSP hashed credentials for offline cracking.
Extracting Windows Credentials Using Native Tools
How to extract credentials from Windows systems using built in commands.
What You Need to Know About Kerberoasting
An overview of Kerbroasting to extract service account credentials.
Session Enumeration With NetSessionEnum API
How to take advantage of the NetSessionEnum API to determine remotely logged in users.
BloodHound by Example
A demonstration of how BloodHound can be used to exploit Active Directory based networks.