References
References
https://jumpcloud.com/resources/active-directory-guide
https://www.pcwdld.com/active-directory-guide
https://blog.procircular.com/llmnr-nbt-ns-spoofing
https://www.varonis.com/blog/pen-testing-active-directory-environments-part-
introduction-crackmapexec-powerview/
https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
https://gbhackers.com/active-directory-penetration-testing-checklist/
https://medium.com/@Dmitriy_Area51/active-directory-penetration-testing-
d9180bff24a1
https://github.com/balaasif6789/AD-Pentesting
https://pentestmag.com/download/pentest-active-directory-pentesting/
Password Cracking:
https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-
used-by-hackers
https://www.guru99.com/how-to-crack-password-of-an-application.html
https://www.freecodecamp.org/news/an-intro-to-password-cracking/
https://www.alphr.com/features/371158/top-ten-password-cracking-techniques/
https://www.geeksforgeeks.org/understanding-rainbow-table-attack/
https://en.wikipedia.org/wiki/Rainbow_table
https://capec.mitre.org/data/definitions/55.html
https://project-rainbowcrack.com/table.htm
Keyloggers:
https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-
1/36138/
https://www.mcafee.com/blogs/consumer/family-safety/what-is-a-keylogger/
https://enterprise.comodo.com/what-is-a-keylogger.php
https://en.wikipedia.org/wiki/Keystroke_logging
Windows/Microsoft Authentication:
https://docs.microsoft.com/en-us/windows-server/security/windows-
authentication/windows-authentication-overview
https://en.wikipedia.org/wiki/NT_LAN_Manager
https://www.windows-active-directory.com/tag/how-does-ntlm-authentication-
work
https://en.wikipedia.org/wiki/Security_Account_Manager
https://www.windows-active-directory.com/windows-security-account-
manager.html
https://en.wikipedia.org/wiki/Kerberos_(protocol)
https://www.varonis.com/blog/kerberos-authentication-explained/
https://cyberx.tech/kerberos-authentication/
Metasploit:
https://www.varonis.com/blog/what-is-metasploit/
https://www.tutorialspoint.com/metasploit/metasploit_quick_guide.htm
https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
Linux Authentication:
http://www.linuxgeek.net/documentation/authentication.phtml
https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/
https://www.computernetworkingnotes.com/rhce-study-guide/etc-shadow-file-in-
linux-explained-with-examples.html
Salting:
https://en.wikipedia.org/wiki/Salt_(cryptography)
https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-
passwords/
https://crackstation.net/hashing-security.htm
https://www.thesslstore.com/blog/difference-encryption-hashing-salting/
Privilege Escalation:
https://en.wikipedia.org/wiki/Privilege_escalation
https://www.netsparker.com/blog/web-security/privilege-escalation/
https://www.cynet.com/cyber-attacks/privilege-escalation/
https://blog.netwrix.com/2018/09/05/what-is-privilege-escalation/
https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology
%20and%20Resources/Windows%20-%20Privilege%20Escalation.md#user-enumeration
https://null-byte.wonderhowto.com/how-to/bypass-uac-escalate-privileges-
windows-using-metasploit-0196076/
Spywares:
https://en.wikipedia.org/wiki/Spyware
https://economictimes.indiatimes.com/definition/spyware
https://www.malwarebytes.com/spyware/
https://www.paloaltonetworks.com/cyberpedia/what-is-spyware
Rootkits:
https://www.cynet.com/blog/a-guide-to-rootkit-detection-history-methods-and-
more/
https://www.adwebtech.com/a-detail-guide-on-rootkit/
https://www.veracode.com/security/rootkit
https://docs.microsoft.com/en-us/windows/security/threat-protection/
intelligence/rootkits-malware
https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJ
iC6YQFjAAegQIAxAB&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Findex-of.es%2FVarios-2%2FMalware%2C%2520Rootkits
%2520%26%2520Botnets%2520A%2520Beginner%2527s
%2520Guide.pdf&usg=AOvVaw1ggEQfggUXnMPjRAWN5pBd
https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJ
iC6YQFjABegQIAhAB&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Findex-of.es%2FHack%2Frootkit-
%2520Rootkits.for.Dummies%25202007.pdf&usg=AOvVaw2IRNmKHHN1BXe2nUYinhVF
https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-
streams/
https://www.deepinstinct.com/2018/06/12/the-abuse-of-alternate-data-stream-
hasnt-disappeared/
https://www.2brightsparks.com/resources/articles/ntfs-alternate-data-stream-
ads.html
http://ntfs.com/ntfs-multiple.htm
Steganography:
https://www.edureka.co/blog/steganography-tutorial
https://null-byte.wonderhowto.com/how-to/guide-steganography-part-1-hide-
secret-messages-images-0130797/
https://www.barcodesinc.com/articles/guide-to-steganography.htm
https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/
Steganography.pdf
Covering Tracks:
https://www.dflabs.com/resources/blog/hacker-lifecycle-phase-5-covering-
tracks-incman-soars-elimination-mechanisms/
https://resources.infosecinstitute.com/penetration-testing-covering-tracks/
#gref
https://null-byte.wonderhowto.com/how-to/hack-like-pro-cover-your-tracks-
leave-no-trace-behind-target-system-0148123/
https://www.globalknowledge.com/ca-en/resources/resource-library/articles/
the-5-phases-of-hacking-covering-your-tracks/