# NTUSTISC - Note ## AD - [0x01 - 環境建置 & Background](https://hackmd.io/@SBK6401/SyA-DsBa2) ### 環境調查Normal - [0x02 - 查詢本地使用者](https://hackmd.io/@SBK6401/Hktcfhw62) - [0x03 - 查詢網域使用者](https://hackmd.io/@SBK6401/BJqJMMECn) - [0x04 - Leak Password](https://hackmd.io/@SBK6401/rkJfMfEAh) - [0x05 - 偵測查詢的操作](https://hackmd.io/@SBK6401/Skh7GGEC2) - [0x06 - 查詢網域群組](https://hackmd.io/@SBK6401/S1k8zM4An) - [0x07 - 當前網域控制站(DC)](https://hackmd.io/@SBK6401/B1hPGGVRh) - [0x08 - BloodHound](https://hackmd.io/@SBK6401/H13mNnPp2) ### 提升權限 - [0x09 - 利用弱點](https://hackmd.io/@SBK6401/SkNdITWA2) - [0x10 - Hijack Token](https://hackmd.io/@SBK6401/r1_sDfNAn) - [0x11 - 偵測提權](https://hackmd.io/@SBK6401/HyisDz4Rn) - [0x12 - 錯誤配置](https://hackmd.io/@SBK6401/Sk1nvGNAn) ### 更多密碼 - [0x13 - Brute Force SAM](https://hackmd.io/@SBK6401/S1KgaEz0h) - [0x14 - Password Spraying](https://hackmd.io/@SBK6401/Byk16MV0n) - [0x15 - 偵測密碼揮灑](https://hackmd.io/@SBK6401/ByTChz4Ch) - [0x16 - 透過Mimikatz取得Local Admin的NTLM](https://hackmd.io/@SBK6401/H15R2zNAh) - [0x17 - 偵測LSASS](https://hackmd.io/@SBK6401/B1DA3fVA2) - [0x18 - 其他方法得到lsass.dmp](https://hackmd.io/@SBK6401/S16T17NCn) - [0x19 - 顯示Mimikatz的明文](https://hackmd.io/@SBK6401/Bk-mYm4R3) - [0x20 - 無法Reboot的時盜取Passwd](https://hackmd.io/@SBK6401/Hk0HXvECh) - [0x21 - AS-REP Roasting](https://hackmd.io/@SBK6401/rk_kO14Jp) ### [會後提及有用的工具和觀念](https://hackmd.io/@SBK6401/SJ6WYPNAn) ### 遠端執行/讀檔 - [0x22 - 遠端執行(RDP)](https://hackmd.io/@SBK6401/rJPbPiVya) - [0x23 - 遠端執行(RDP)2](https://hackmd.io/@SBK6401/Bkxs1SSgp) - [0x24 - SMB遠端讀寫](https://hackmd.io/@SBK6401/Syn5Q8rga) ## DFIR - [0x01 - MrRobot - Target 1](https://hackmd.io/@SBK6401/SkJAThwla) - [0x02 - MrRobot - Target 2](https://hackmd.io/@SBK6401/HJz2FPne6) - [0x03 - MrRobot - POS](https://hackmd.io/@SBK6401/BJpJqDhlp)
{"description":"0x01 - 環境建置 & Background","title":"NTUSTISC - Note","contributors":"[{\"id\":\"507cd57e-1008-4e58-8e33-79854a8ea67c\",\"add\":2024,\"del\":117}]"}
Expand menu