Tactics, Techniques, and Procedures
CtrlK
Personal BlogTwitterGitHubContact
  • Tactics, Techniques, and Procedures
  • ☠️Pentesting
    • Fortress
    • Infrastructure
      • Active Directory
        • AD CS
        • Coercing Authentication
        • Credential Dumping
        • Delegation Abuse
        • Domain Enumeration
        • Domain Dominance
        • Group Policy Preferences
        • Kerberos
        • Lateral Movement
        • Local Administrator Password Solution (LAPS)
        • NoPac
        • NTLMv1
        • Password Cracking
        • Password Policy
        • Password Spraying
        • Reconnaissance
        • Relaying
          • LDAP Relaying
          • SMB Relaying
        • Shadow Credentials
        • Zerologon
      • Database Management System (DBMS)
      • Defense Evasion
      • Low-Hanging Fruit
      • Networks
      • Persistence
      • Pivoting
      • Privilege Escalation
    • Initial Access
    • OSINT
    • Web Applications
    • Wireless
    • Cloud
  • 🧨Red Teaming
    • C2
    • Malware Dev
    • Offensive Infrastructure
    • Offensive Tactics
    • Philosophy
  • 🦋Bug Bounty
    • Bug Bounty Tips & Tricks
  • 📖Resources
    • Blog Posts and Goodies
    • Checklists
    • Offensive Security Notes
    • Tooling Repository
    • Active Directory Toolkit
Powered by GitBook
On this page
  1. ☠️Pentesting
  2. Infrastructure
  3. Active Directory

Relaying

LogoWe Love Relaying Credentials: A Technical Guide to Relaying Credentials EverywhereSecureAuth
LogoI’m bringing relaying back: A comprehensive guide on relaying anno…TrustedSec
PreviousReconnaissanceNextLDAP Relaying

Last updated 2 years ago