References
- Internal Monologue Attack – Retrieving NTLM Hashes without Touching LSASS: https://github.com/eladshamir/Internal-Monologue
- Pre-created computer account research: https://www.trustedsec.com/blog/diving-into-pre-created-computer-accounts/
- Exploiting GPP: https://adsecurity.org/?p=2288
- CrackMapExec: https://github.com/Porchetta-Industries/CrackMapExec
- Kerbrute: https://github.com/ropnop/kerbrute
- DomainPasswordSpray: https://github.com/dafthack/DomainPasswordSpray
- NTLM relay: https://en.hackndo.com/ntlm-relay/
- Responder: https://github.com/lgandx/Responder
- Harvesting NetNTLM: https://www.mdsec.co.uk/2021/02/farming-for-red-teams-harvesting-netntlm/
- Coerced authentication methods: https://github.com/p0dalirius/windows-coerced-authentication-methods
- SpoolSample: https://github.com/leechristensen/SpoolSample
- PetitPotam: https://github.com/topotam/PetitPotam
- WebClient Service Scanner: https://github.com/Hackndo/WebclientServiceScanner...