Force NTLM Privileged Authentication
SharpSystemTriggers
Spooler Service Abuse
Finding Windows Servers on the domain
Get-ADComputer -Filter {(OperatingSystem -like "*windows*server*") -and (OperatingSystem -notlike "2016") -and (Enabled -eq "True")} -Properties * | select Name | ft -HideTableHeaders > servers.txtFinding Spooler services listening
. .\Get-SpoolStatus.ps1
ForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}Ask the service to authenticate against an arbitrary host
Combining with Unconstrained Delegation
RCP Force authentication
PrivExchange
Inside Windows
Defender MpCmdRun
MSSQL
Certutil
HTML injection
Via email
MitM
Cracking NTLMv1
Last updated

