# Infrastructure

- [Active Directory](/pentesting/infrastructure/active-directory.md)
- [AD CS](/pentesting/infrastructure/active-directory/ad-cs.md)
- [Coercing Authentication](/pentesting/infrastructure/active-directory/coercing-authentication.md)
- [Credential Dumping](/pentesting/infrastructure/active-directory/os-credential-dumping.md): MITRE ATT\&CK, Credential Access, ID TA0006
- [Cached Domain Credentials](/pentesting/infrastructure/active-directory/os-credential-dumping/cached-domain-credentials.md): MITRE ATT\&CK, Credential Access, Sub-technique T1003.005
- [Data Protection API (DPAPI)](/pentesting/infrastructure/active-directory/os-credential-dumping/data-protection-api-dpapi.md)
- [Group Policy Preferences](/pentesting/infrastructure/active-directory/os-credential-dumping/group-policy-preferences.md): MITRE ATT\&CK, Credential Access, Sub-technique T1552.006
- [LSA Secrets](/pentesting/infrastructure/active-directory/os-credential-dumping/lsa-secrets.md): MITRE ATT\&CK, Credential Access, Sub-technique T1003.004
- [LSASS Memory](/pentesting/infrastructure/active-directory/os-credential-dumping/lsass-memory.md): MITRE ATT\&CK, Credential Access, Sub-technique T1003.001
- [NTDS](/pentesting/infrastructure/active-directory/os-credential-dumping/ntds.md)
- [Security Account Manager (SAM)](/pentesting/infrastructure/active-directory/os-credential-dumping/security-account-manager-sam.md): MITRE ATT\&CK, Credential Access, Sub-technique T1003.002
- [Kerberos Tickets](/pentesting/infrastructure/active-directory/os-credential-dumping/kerberos-tickets.md): MITRE ATT\&CK, Credential Access, Technique T1558
- [Unsecured Credentials](/pentesting/infrastructure/active-directory/os-credential-dumping/unsecured_credentials-1.md): MITRE ATT\&CK, Credential Access, Technique T1552
- [WDigest](/pentesting/infrastructure/active-directory/os-credential-dumping/wdigest.md)
- [WiFi Profiles](/pentesting/infrastructure/active-directory/os-credential-dumping/wifi-profiles.md)
- [Delegation Abuse](/pentesting/infrastructure/active-directory/delegation-abuse.md)
- [Constrained Delegation](/pentesting/infrastructure/active-directory/delegation-abuse/constrained-delegation.md)
- [Unconstrained Delegation](/pentesting/infrastructure/active-directory/delegation-abuse/unconstrained-delegation.md)
- [Domain Enumeration](/pentesting/infrastructure/active-directory/domain_enumeration.md)
- [Domain Dominance](/pentesting/infrastructure/active-directory/domain-dominance.md)
- [Forge Golden Ticket](/pentesting/infrastructure/active-directory/domain-dominance/create_golden_ticket.md): MITRE ATT\&CK, Credential Access, Technique T1558.001
- [Forge Silver Ticket](/pentesting/infrastructure/active-directory/domain-dominance/create-silver-ticket.md): MITRE ATT\&CK, Credential Access, Technique T1558.002
- [Forge Trust Ticket](/pentesting/infrastructure/active-directory/domain-dominance/forge-trust-ticket.md)
- [Skeleton Key](/pentesting/infrastructure/active-directory/domain-dominance/skeleton_key.md)
- [Group Policy Preferences](/pentesting/infrastructure/active-directory/group-policy-preferences.md)
- [Kerberos](/pentesting/infrastructure/active-directory/kerberos.md)
- [AS-REP Roasting](/pentesting/infrastructure/active-directory/kerberos/as-rep-roasting.md)
- [Kerberoasting](/pentesting/infrastructure/active-directory/kerberos/kerberoasting.md)
- [Kerberos Relaying](/pentesting/infrastructure/active-directory/kerberos/kerberos-relaying.md)
- [Lateral Movement](/pentesting/infrastructure/active-directory/lateral_movement.md): MITRE ATT\&CK, Lateral Movement, ID TA0008
- [PowerShell](/pentesting/infrastructure/active-directory/lateral_movement/exploitation_with_powershell.md): MITRE ATT\&CK, Execution, Technique T1059.001
- [Windows Remote Management (WinRM)](/pentesting/infrastructure/active-directory/lateral_movement/winrm.md): MITRE ATT\&CK, Lateral Movement, Sub-technique T1021.006
- [Local Administrator Password Solution (LAPS)](/pentesting/infrastructure/active-directory/local-administrator-password-solution-laps.md)
- [NoPac](/pentesting/infrastructure/active-directory/nopac.md)
- [NTLMv1](/pentesting/infrastructure/active-directory/ntlmv1.md)
- [Password Cracking](/pentesting/infrastructure/active-directory/password_cracking.md): MITRE ATT\&CK, Credential Access, Sub-technique T1110.002
- [Password Policy](/pentesting/infrastructure/active-directory/password-policy.md)
- [Password Spraying](/pentesting/infrastructure/active-directory/password-spraying.md): Methodology for performing password spraying attacks against active directory
- [Reconnaissance](/pentesting/infrastructure/active-directory/reconnaissance.md)
- [Relaying](/pentesting/infrastructure/active-directory/relaying.md)
- [LDAP Relaying](/pentesting/infrastructure/active-directory/relaying/ldap-relaying.md)
- [SMB Relaying](/pentesting/infrastructure/active-directory/relaying/smb-relaying.md)
- [Shadow Credentials](/pentesting/infrastructure/active-directory/shadow-credentials.md)
- [Zerologon](/pentesting/infrastructure/active-directory/zerologon.md)
- [Database Management System (DBMS)](/pentesting/infrastructure/database-management-system-dbms.md)
- [Microsoft SQL Server](/pentesting/infrastructure/database-management-system-dbms/sql-stored-procedures.md): Obtaining a shell after obtaining credentials to a Microsoft SQL Server.
- [Defense Evasion](/pentesting/infrastructure/defense_evasion.md): MITRE ATT\&CK, Defense Evasion, ID TA0005
- [Disable or Modify Tools](/pentesting/infrastructure/defense_evasion/disable_antivirus.md): MITRE ATT\&CK, Defense Evasion, Sub-technique T1562.001
- [Disable Windows Event Logging](/pentesting/infrastructure/defense_evasion/disable-windows-event-logging.md): MITRE ATT\&CK, Defense Evasion, Sub-technique T1562.002
- [Impair Command History Logging](/pentesting/infrastructure/defense_evasion/impair-command-history-logging.md): MITRE ATT\&CK, Defense Evasion, Sub-technique T1562.003
- [Timestomping](/pentesting/infrastructure/defense_evasion/timestomping.md)
- [Low-Hanging Fruit](/pentesting/infrastructure/easy_hacks.md): Easy ways to get a shell
- [Networks](/pentesting/infrastructure/networks.md)
- [IPv6](/pentesting/infrastructure/networks/ipv6.md)
- [LLMNR/NBT-NS Poisoning](/pentesting/infrastructure/networks/poisoning-with-responder.md)
- [Network Scanning](/pentesting/infrastructure/networks/network-scanning.md): MITRE ATT\&CK, Discovery, Technique T1046
- [Network Sniffing](/pentesting/infrastructure/networks/network-sniffing.md): MITRE ATT\&CK, Discovery, Technique T1040
- [Segmentation Testing](/pentesting/infrastructure/networks/segmentation_testing_notes.md): When performing segmentation tests for PCI compliance, there aside from my Nmap scans there are a few things I've wanted to keep jotted down. This section contains my notes.
- [Simple Network Management Protocol (SNMP)](/pentesting/infrastructure/networks/simple-network-management-protocol-snmp.md)
- [Subnet Enumeration](/pentesting/infrastructure/networks/subnet-enumeration.md)
- [Identifying Domain Information](/pentesting/infrastructure/networks/identifying-domain-information.md)
- [Persistence](/pentesting/infrastructure/persistence.md): MITRE ATT\&CK, Persistence, ID TA0003
- [Create Account](/pentesting/infrastructure/persistence/create-account.md): MITRE ATT\&CK, Persistence, Technique T1136
- [Remote Desktop](/pentesting/infrastructure/persistence/remote-desktop.md)
- [Services](/pentesting/infrastructure/persistence/services.md)
- [Service Privilege Escalation / Persistence](/pentesting/infrastructure/persistence/services/service-privilege-escalation-persistence.md)
- [Systemd Service Persistence](/pentesting/infrastructure/persistence/services/systemd-service-persistence.md): MITRE ATT\&CK, Persistence, Sub-technique T1543.002
- [Web Shell](/pentesting/infrastructure/persistence/web-shell.md): MITRE ATT\&CK, Persistence, Sub-technique T1505.003
- [DLL Hijacking](/pentesting/infrastructure/persistence/dll-hijacking.md)
- [Pivoting](/pentesting/infrastructure/protocol-tunneling.md): MITRE ATT\&CK, Command and Control, Technique T1572
- [Privilege Escalation](/pentesting/infrastructure/privilege_escalation.md): MITRE ATT\&CK, Privilege Escalation, ID TA0004
- [Linux](/pentesting/infrastructure/privilege_escalation/linux.md): List of commonly used escalation tools for Linux systems
- [Setuid and Setgid](/pentesting/infrastructure/privilege_escalation/linux/setuid-and-setgid.md): MITRE ATT\&CK, Privilege Escalation, Sub-technique T1548.001
- [Windows](/pentesting/infrastructure/privilege_escalation/windows.md): List of commonly used escalation tools for Windows systems
- [Privilege Abuse](/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges.md)
- [SeImpersonatePrivilege](/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges/seimpersonateprivilege.md)
- [SeLoadDriverPrivilege](/pentesting/infrastructure/privilege_escalation/windows/abusing-privileges/seloaddriverprivilege.md): Privilege escalation using the load and unload device drivers policy (SeLoadDriverPrivilege).
- [Service Exploitation](/pentesting/infrastructure/privilege_escalation/windows/service-exploitation.md): Basic commands when abusing services to elevate privileges after being identified with a tool such as WinPEAS.
