Pentest
Ctrlk
  • Homepage
  • Pentest Links
  • 01 Prep
  • 02 Scan
  • 03 Getting In
  • 04 WebApps
  • 05 Passwords & Ciphers
  • 06 Linux PrivEsc
  • 07 Windows PrivEsc
    • 1 Windows cmd kungfu
    • 2 Enums
    • 3 PrivEsc
    • 4 Kernel Exploits
    • 5 Looting
    • Bloodhound
    • DLL Hijack MSF
    • Kerberos
    • Memory Analysis
    • NTDS
    • Powershell
    • Responder
    • Saved Creds runas
Powered by GitBook
On this page

Was this helpful?

  1. 07 Windows PrivEsc

5 Looting

After system/admin:

  1. Go for sam dump on windows using reg.exe https://xapax.github.io/security/#attacking_active_directory_domain/active_directory_privilege_escalation/credential_extraction/#extract-credentials-from-sam-and-security-hives-from-registry

  2. REF:

    1. https://github.com/mubix/post-exploitation-wiki

Previous4 Kernel ExploitsNextBloodhound

Last updated 2 years ago

Was this helpful?