Page cover image

Pwning

Dive deep into our comprehensive article about Assumed Breach, a vital approach in cybersecurity. Learn its significance, advantages, and implementation strategies for improved security.

Assumed Breach

After getting access into a machine we need to start understanding the system we are In!

1 - Enumerate Local Machine (Student VM)

Organize all the common tools you use bypass any PowerShell restrictions and start Enumerating.

Remember the Enumeration focus is data to help us attack AD CS.

Common Enumeration

  • Local Users

  • Domain Users

  • Domain Machines

  • Local VM Restrictions

  • Where is the DC?

  • Where is the CA?

Local Users

// Some code

Domain Users

// Some code

Domain Machines

// Some code

Local VM Restrictions

// Some code

Where is the DC?

// Some code

Where is the CA?

// Some code

Last updated