From 255bc1060ed523a2d6452b3c81a30fd3cf6b047f Mon Sep 17 00:00:00 2001 From: Dread <42398281+D7EAD@users.noreply.github.com> Date: Sat, 2 Aug 2025 01:40:04 -0400 Subject: [PATCH] Fix links --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index cad842a..62042fa 100644 --- a/README.md +++ b/README.md @@ -18,8 +18,8 @@ A `KRB-ERROR (16) : KDC_ERR_PADATA_TYPE_NOSUPP` will be raised if pre-req 3 is n More information about this "Shadow Credentials" primitive: - [Shadow Credentials: Abusing Key Trust Account Mapping for Takeover](https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab) - - [The Hacker Recipes - ACEs abuse](https://www.thehacker.recipes/active-directory-domain-services/movement/access-control-entries) - - [The Hacker Recipes - Shadow Credentials](https://www.thehacker.recipes/active-directory-domain-services/movement/access-control-entries/shadow-credentials) + - [The Hacker Recipes - ACEs and DACL abuse](https://www.thehacker.recipes/ad/movement/dacl/) + - [The Hacker Recipes - Shadow Credentials](https://www.thehacker.recipes/ad/movement/kerberos/shadow-credentials) # Usage @@ -35,11 +35,11 @@ pyWhisker can be used to operate various actions on the msDs-KeyCredentialLink a pyWhisker supports the following authentications: - (NTLM) Cleartext password - - (NTLM) [Pass-the-hash](https://www.thehacker.recipes/active-directory-domain-services/movement/lm-and-ntlm/pass-the-hash) + - (NTLM) [Pass-the-hash](https://www.thehacker.recipes/ad/movement/ntlm/pth) - (Kerberos) Cleartext password - - (Kerberos) [Pass-the-key](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-key) / [Overpass-the-hash](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/overpass-the-hash) - - (Kerberos) [Pass-the-cache](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-cache) (type of [Pass-the-ticket](https://www.thehacker.recipes/active-directory-domain-services/movement/kerberos/pass-the-ticket)) - - (LDAP over Schannel) [Pass-the-cert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) + - (Kerberos) [Pass-the-key](https://www.thehacker.recipes/ad/movement/kerberos/ptk) / [Overpass-the-hash](https://www.thehacker.recipes/ad/movement/kerberos/opth) + - (Kerberos) [Pass-the-cache](https://www.thehacker.recipes/ad/movement/kerberos/ptc) (type of [Pass-the-ticket](https://www.thehacker.recipes/ad/movement/kerberos/ptt)) + - (LDAP over Schannel) [Pass-the-cert](https://www.thehacker.recipes/ad/movement/kerberos/pass-the-certificate) Among other things, pyWhisker supports multi-level verbosity, just append `-v`, `-vv`, ... to the command :)