LogoLogo
Ctrlk
Tech With ZDefense PlaybookWeb Exploitation Playbook
  • Pentest Playbook
  • Methodology
    • Pentest Methodology
    • External Pentest Checklist
  • Pentest Planning and Scoping
  • Reconnaissance
    • Passive Reconnaissance
    • Active Reconnaissance
  • Password Cracking
    • Password Attacks
  • Active Directory
    • Initial Attack Vectors
    • Post-Compromise Enumeration
    • Post-Compromise Attacks
      • CrackMapExec
      • SecretsDump
      • Kerberoasting
      • Token Impersonation
      • LNK File Attack
      • GPP or cPassword Attack
      • Mimikatz
  • Privilege Escalation
    • Linux Privilege Escalation
    • Windows Privilege Escalation
  • Tools & Cheat Sheets
    • Tools
    • Cheat Sheets
Powered by GitBook
On this page
  1. Active Directory

Post-Compromise Attacks

CrackMapExecSecretsDumpKerberoastingToken ImpersonationLNK File AttackGPP or cPassword AttackMimikatz
PreviousPingCastleNextCrackMapExec

© 2025 Tech With Z