Active Directory Enumeration and Explotation
Tags
Common Information
Type | Value |
---|---|
UUID | 7c91f04a-f440-4df6-9a4f-9dace07b1180 |
Fingerprint | b798795249d0a3b5 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 11, 2024, 2:55 a.m. |
Added to db | Dec. 11, 2024, 4:16 a.m. |
Last updated | Dec. 26, 2024, 10:05 a.m. |
Headline | Active Directory Enumeration and Explotation |
Title | Active Directory Enumeration and Explotation |
Detected Hints/Tags/Attributes | 61/1/25 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | windapsearch.py |
|
Details | Domain | 4 | rbcd.py |
|
Details | Domain | 1 | pywhisker.py |
|
Details | Domain | 4735 | github.com |
|
Details | Domain | 5 | gettgtpkinit.py |
|
Details | Domain | 1 | targetedkerberoast.py |
|
Details | File | 3 | xato-net-10-million-usernames.txt |
|
Details | File | 1 | windapsearch.py |
|
Details | File | 2 | valid_users.txt |
|
Details | File | 280 | rockyou.txt |
|
Details | File | 39 | powerview.ps1 |
|
Details | File | 1 | snaffler.exe |
|
Details | File | 5 | setspn.exe |
|
Details | File | 4 | powerupsql.ps1 |
|
Details | File | 1 | reset_local_admin_pass.vbs |
|
Details | File | 18 | groups.xml |
|
Details | File | 3 | get-gpppassword.ps1 |
|
Details | File | 37 | rubeus.exe |
|
Details | File | 4 | rbcd.py |
|
Details | File | 1 | pywhisker.py |
|
Details | File | 1 | lrdxhxbi.pfx |
|
Details | File | 5 | gettgtpkinit.py |
|
Details | File | 1 | targetedkerberoast.py |
|
Details | Github username | 6 | dirkjanm |
|
Details | Url | 1 | https://github.com/dirkjanm/pkinittools |