Security Notes
search
⌘Ctrlk
Security Notes
  • redhatWhoami
  • Notes
    • Qiuch Recon Methodology
    • Enumeration
    • Active Directory Pentesting
      • Active Directory Components
      • Initial Attack Vectors
        • LLMNR Poisoning
        • SMB Relay Attacks
        • IPv6 Attacks ( IPv6 DNS Takeover )
        • Printer Hacking
        • Methodology
        • Some Other Attacks
          • Zerologon (CVE-2020-1472)
          • PrintNightmare (CVE-2021-1675)
      • Post-Compromise Attacks
      • We've Compromised the Domain
      • Case Study
      • Password Attacks
    • API-Pen
    • Attack Vectors by Port
  • Portswigger Labs
  • owsap-top-10:2025
    • A10 Mishandling of Exceptional Conditions
    • A09 Security Logging and Alerting Failures
    • A08 Software or Data Integrity Failures
    • A07 Authentication Failures
    • A06 Insecure Design
    • A05 Injection
    • A04 Cryptographic Failures
    • A03 Software Supply Chain Failures
    • A02 Security Misconfiguration
    • A01 Broken Access Control
  • write up
  • How I Turned an Image Upload Feature into Full Server Access Using DNS Queries
  • How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
  • Privilege Escalation via Impersonation Features feature
  • How I Escalated Simple HTML Injection to SSRF via PDF Rendering
  • How I was able to discover ATO Via IDOR vulnerability
  • how I Bypassed SAML Authentication, and had access to Admin Panel.
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. Active Directory Pentestingchevron-right
  3. Initial Attack Vectors

Some Other Attacks

Zerologon (CVE-2020-1472)chevron-rightPrintNightmare (CVE-2021-1675)chevron-right
PreviousMethodologychevron-leftNextZerologon (CVE-2020-1472)chevron-right