Projects STRLCPY GOAD Commits 5fa7dd58
🤬
  • ■ ■ ■ ■ ■
    README.md
    skipped 278 lines
    279 279  ```
    280 280   solution : re-run Ansible script
    281 281   
    282  -## Thanks to
     282 +## Special Thanks to
     283 + 
     284 +- Thomas Rollain (tests & some vulns writing)
     285 +- Quentin Galliou (tests)
     286 + 
     287 +## Links
     288 +- https://unicornsec.com/home/siem-home-lab-series-part-1
     289 +- https://github.com/jckhmr/adlab
     290 +- https://www.jonathanmedd.net/2019/09/ansible-windows-and-powershell-the-basics-introduction.html
     291 +- https://www.secframe.com/badblood/
     292 +- https://josehelps.com/blog/2019-08-06_building-a-windows-2016-dc/
     293 +- https://medium.com/@vartaisecurity/lab-building-guide-virtual-active-directory-5f0d0c8eb907
     294 +- https://www.ansible.com/blog/an-introduction-to-windows-security-with-ansible
     295 +- https://github.com/rgl/windows-domain-controller-vagrant
     296 +- https://www.sconstantinou.com/powershell-active-directory-delegation-part-1/
     297 +- https://www.shellandco.net/playing-acl-active-directory-objects/
     298 +- https://github.com/clong/DetectionLab
     299 +- https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces
     300 +- ...
    283 301   
    284  -This repo is based on the work of [jckhmr](https://github.com/jckhmr/adlab) and [kkolk](https://github.com/kkolk/mssql)
     302 +## Note
     303 +- This repo is based on the work of [jckhmr](https://github.com/jckhmr/adlab) and [kkolk](https://github.com/kkolk/mssql)
    285 304   
Please wait...
Page is in error, reload to recover