Navigation : Reconnaissance Enumeration Initial access Exploitation - Exploitation Unix - Exploitation Windows - Exploitation AD -- Exploitation Kerberos -- DPAPI -- GPO -- NTLM -- Security descriptors - MITM Post-Exploitation Wi-Fi Web Misc Forensic Exploitation AD Exploitation Kerberos Tickets Roasting Trust PTH and Over PTH Delegation DPAPI GPO NTLM Security descriptors SQL Exploitation Kerberos