💥Cyb3rBook

Home

❯

002 PENTESTING

❯

WINDOWS PENTESTING

❯

SHADOW CREDENTIALS

SHADOW CREDENTIALS

Jan 29, 20261 min read

PRIMARY CATEGORY → KERBEROS

Theory


Abuse - UNIX-like

Certipy

Certipy

A
certipy shadow auto -dc-ip '<DC_IP>' -username '<USER>' -password '<PASSWD>' -account '<TARGET_ACCOUNT>'
PyWhisker + PKINITtools
Usage
 
A

PyWhisker

 
B

PKINITtools

PtC

 
C

PKINITtools

UtH

 
BloodyAD

BloodyAD

A
 
B?

Resources


Graph View

  • Theory
  • Abuse - UNIX-like
  • Resources

Backlinks

  • FLUFFY
  • FOREST
  • TOMBWATCHER
  • 1433 - MSSQL
  • KERBEROS RELAY
  • KERBEROS
  • MS-RPRN ABUSE
  • PASS THE CERTIFICATE

Created with Quartz v4.4.0 © 2026

  • GitHub
  • LinkedIn