AD Privilege Escalation
search
⌘Ctrlk
AD Privilege Escalation
  • Iperius Backup Service Privilege Escalation
  • ManageEngine ADSelfService Plus PrivEsc
  • Mimikatz
  • Outlook Reminder Privilege Escalation
  • UAC Windows Privilege Escalation
  • Windows PrivEsc with Kerberos
  • Windows PrivEsc with LocalPotato
  • Windows PrivEsc with Registry Keys
  • Windows PrivEsc with RemotePotato
  • Windows PrivEsc with SeBackupPrivilege
  • Windows PrivEsc with Unquoted Service Path
  • Windows Privilege Escalation
  • Windows Pivoting
  • AD CS (Active Directory Certificate Services) Pentesting
  • Dumping Windows Password Hashes
  • WSL Pentesting
  • Windows Memory Dump Analysis
  • Windows Remote Code Execution from Linux
  • Windows XML EventLog (EVTX)
  • M365 (Microsoft Office 365) Pentesting
  • Microsoft Outlook Message (.msg)
  • Microsoft Word Pentesting
  • Reading OneDrive Logs
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down

M365 (Microsoft Office 365) Pentesting

hashtag
Enumerationarrow-up-right

hashtag
Password Sprayingarrow-up-right

We may spray user passwords with open-source tools as below.

LogoGitHub - dafthack/MFASweep: A tool for checking if MFA is enabled on multiple Microsoft ServicesGitHubchevron-right
LogoGitHub - 0xZDH/o365spray: Username enumeration and password spraying tool aimed at Microsoft O365.GitHubchevron-right
PreviousWindows XML EventLog (EVTX)chevron-leftNextMicrosoft Outlook Message (.msg)chevron-right

Last updated 2 years ago