yuyudhn's notes
  • About
  • πŸš‰QUICKSTART
    • Prerequisite
    • Reconnaissance
    • Exploitation
    • Post Exploitation
    • β›ˆοΈMisc
  • πŸͺŸActive Directory
    • Basic Command
    • Enumeration
      • PowerView
    • Service Exploitation
      • LDAP
      • SMB
        • MS17-010
      • MSSQL
    • Privilege Escalation
      • Unquoted Service Path
      • UAC Bypass
      • Token Abuse
    • Post Exploitation
      • Tunneling with Ligolo-ng
    • Credential Hunting
      • Group Policy Preferences
      • DPAPI
  • MITRE ATT&CK
    • Defense Evasion
      • Physical Attack: Remove EDR
      • AMSI Bypass
    • Credential Access
      • Dump SAM Hashes via Registry
  • 🐧Linux
    • Misc
    • Linux Post Exploitation
    • Linux Password Hunting
  • 🐚Backdoor Stuff
    • Simple PHP Webshell
    • MSFvenom Generate Payload
  • πŸ“³Mobile Pentest: iOS
    • iOS Penetration Testing
    • Objection
  • πŸ•ΈοΈWeb Application
    • Common Applications
      • Tomcat
      • Joomla
    • SSTI
    • File Inclusion
    • XSS
    • Misc
  • πŸ–ŠοΈMachine Writeup
    • HackTheBox
      • Perfection
      • Pilgrimage
      • PC
      • Shoppy
      • GoodGames
      • Photobomb
      • Support
Powered by GitBook
On this page

Was this helpful?

  1. Active Directory

Service Exploitation

Basic Service Exploitation in Windows or Active Directory

PreviousPowerViewNextLDAP

Last updated 1 year ago

Was this helpful?

Service exploitation in the context of Active Directory security involves the exploitation of various services such as SMB (Server Message Block), WinRM (Windows Remote Management), LDAP (Lightweight Directory Access Protocol), and others, typically to gain unauthorized access or escalate privileges within a network. Attackers may exploit vulnerabilities or misconfigurations in these services to execute remote code, conduct reconnaissance, or perform lateral movement within the network. For example, exploiting SMB vulnerabilities like EternalBlue could allow an attacker to execute arbitrary code remotely and propagate across machines. Similarly, abusing misconfigured WinRM endpoints could provide attackers with remote administrative access to compromised systems.

πŸͺŸ
SMB
LDAP