kyou
search
⌘Ctrlk
kyou
  • WHOAMI
    • Robemar Aviles
  • Tryhackme
    • View
  • Hack the box
    • View
  • Academy HTB
    • View
  • Over The Wire
    • View
  • Under The Wire
    • View
  • PicoCTF
    • View
  • Portswigger
    • View
  • Hacker101
    • View
  • Python
    • View
  • SQL
    • View
  • Notes
    • View
      • IMPORTANTTTTT
      • Windows
        • Windows Management Instrumentation (WMI)
        • Windows Remote Management (WinRM)
        • NTDS.DIT
        • Built-in AD Groups
        • Schema Active Directory
        • Trusts Active Directory
        • Foreign Security Principals (FSPs)
        • Replication
        • SYSVOL
        • Fully Qualified Domain Name (FQDN)
        • Read-Only Domain Controller (RODC)
        • FSMO Roles
        • Global Unique Identifier (GUID)
        • Registry
        • User Account Control (UAC)
        • Access Control Entries (ACE)
        • Copying SAM Registry Hives
        • Security Accounts Manager (SAM)
        • Security Identifier (SID)
        • Execution Policy
        • Windows non-interactive accounts
        • Security Descriptor Definition Language (SDDL)
        • Windows System Structure
        • DACL and SACL
      • Nmap
      • Endpoint Detection and Response
      • SIEM
      • DMARC
      • Forward Proxy and Reverse Proxy
      • Brute Force/ Dictionary Attack
      • SMTP/IMAP/POP
      • Downloading subfinder
      • DNS
      • MITRE ATT&CK
      • Staged vs. Stageless Payloads
      • Server Log Poisoning
      • PHP Session Poisoning
      • secure_file_priv
      • Metasploit Payload
      • Metasploit Types
      • Types of Box
      • Vulnerable Machine/Applications
      • Cron Jobs
      • Webroot
      • Subdomains and Virtual hosts
      • Fuzzing/Gobuster Extensions
      • URI and URL
      • eXtensible Markup Language (XML)
      • Time to Live (TTL)
      • Stateful and Stateless Firewalls
      • IDS vs IPS vs SIEM
      • Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
      • Reconnaissance and Enumeration
      • Address Resolution Protocol
      • SSL Certificate
      • Transmission Control Protocol (TCP)
      • Dictionary and Brute Force Attack
      • Encoding, Encryption, Cryptography
  • Commands
    • View
  • Google Chrome Password
  • Comptia Security+ 701
  • CCNA
  • Malware Analysis Lab
  • TCM
    • Linux 100: Fundamentals
    • Programming 100: Fundamentals
    • Practical Bug Bounty
    • Practical Web Hacking
    • Web pen
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Noteschevron-right
  2. View

Windows

Windows Management Instrumentation (WMI)chevron-rightWindows Remote Management (WinRM)chevron-rightNTDS.DITchevron-rightBuilt-in AD Groupschevron-rightSchema Active Directorychevron-rightTrusts Active Directorychevron-rightForeign Security Principals (FSPs)chevron-rightReplicationchevron-rightSYSVOLchevron-rightFully Qualified Domain Name (FQDN)chevron-rightRead-Only Domain Controller (RODC)chevron-rightFSMO Roleschevron-rightGlobal Unique Identifier (GUID)chevron-rightRegistrychevron-rightUser Account Control (UAC)chevron-rightAccess Control Entries (ACE)chevron-rightCopying SAM Registry Hiveschevron-rightSecurity Accounts Manager (SAM)chevron-rightSecurity Identifier (SID)chevron-rightExecution Policychevron-rightWindows non-interactive accountschevron-rightSecurity Descriptor Definition Language (SDDL)chevron-rightWindows System Structurechevron-rightDACL and SACLchevron-right
PreviousLXD/LXCchevron-leftNextWindows Management Instrumentation (WMI)chevron-right