Active Directory:

	https://jumpcloud.com/resources/active-directory-guide

	https://www.pcwdld.com/active-directory-guide

	https://blog.procircular.com/llmnr-nbt-ns-spoofing

	https://www.varonis.com/blog/pen-testing-active-directory-environments-part-introduction-crackmapexec-powerview/

	https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/

	https://gbhackers.com/active-directory-penetration-testing-checklist/

	https://medium.com/@Dmitriy_Area51/active-directory-penetration-testing-d9180bff24a1

	https://github.com/balaasif6789/AD-Pentesting

	https://pentestmag.com/download/pentest-active-directory-pentesting/

Password Cracking:

	https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hackers

	https://www.guru99.com/how-to-crack-password-of-an-application.html

	https://www.freecodecamp.org/news/an-intro-to-password-cracking/

	https://www.alphr.com/features/371158/top-ten-password-cracking-techniques/

	https://www.geeksforgeeks.org/understanding-rainbow-table-attack/

	https://en.wikipedia.org/wiki/Rainbow_table

	https://capec.mitre.org/data/definitions/55.html

	https://project-rainbowcrack.com/table.htm

Keyloggers:
	
	https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/

	https://www.mcafee.com/blogs/consumer/family-safety/what-is-a-keylogger/

	https://enterprise.comodo.com/what-is-a-keylogger.php

	https://en.wikipedia.org/wiki/Keystroke_logging

Windows/Microsoft Authentication:

	https://docs.microsoft.com/en-us/windows-server/security/windows-authentication/windows-authentication-overview

	https://en.wikipedia.org/wiki/NT_LAN_Manager

	https://www.windows-active-directory.com/tag/how-does-ntlm-authentication-work

	https://en.wikipedia.org/wiki/Security_Account_Manager

	https://www.windows-active-directory.com/windows-security-account-manager.html

	https://en.wikipedia.org/wiki/Kerberos_(protocol)

	https://www.varonis.com/blog/kerberos-authentication-explained/

	https://cyberx.tech/kerberos-authentication/

Metasploit:

	https://www.varonis.com/blog/what-is-metasploit/

	https://www.tutorialspoint.com/metasploit/metasploit_quick_guide.htm

	https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

Linux Authentication:

	http://www.linuxgeek.net/documentation/authentication.phtml

	https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/

	https://www.computernetworkingnotes.com/rhce-study-guide/etc-shadow-file-in-linux-explained-with-examples.html

Salting:

	https://en.wikipedia.org/wiki/Salt_(cryptography)

	https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/

	https://crackstation.net/hashing-security.htm

	https://www.thesslstore.com/blog/difference-encryption-hashing-salting/

Privilege Escalation:

	https://en.wikipedia.org/wiki/Privilege_escalation

	https://www.netsparker.com/blog/web-security/privilege-escalation/

	https://www.cynet.com/cyber-attacks/privilege-escalation/

	https://blog.netwrix.com/2018/09/05/what-is-privilege-escalation/

	https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/

	https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Windows%20-%20Privilege%20Escalation.md#user-enumeration

	https://null-byte.wonderhowto.com/how-to/bypass-uac-escalate-privileges-windows-using-metasploit-0196076/

Spywares:

	https://en.wikipedia.org/wiki/Spyware

	https://economictimes.indiatimes.com/definition/spyware

	https://www.malwarebytes.com/spyware/

	https://www.paloaltonetworks.com/cyberpedia/what-is-spyware

Rootkits:
	
	https://www.cynet.com/blog/a-guide-to-rootkit-detection-history-methods-and-more/

	https://www.adwebtech.com/a-detail-guide-on-rootkit/

	https://www.veracode.com/security/rootkit

	https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/rootkits-malware

	https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJiC6YQFjAAegQIAxAB&url=http%3A%2F%2Findex-of.es%2FVarios-2%2FMalware%2C%2520Rootkits%2520%26%2520Botnets%2520A%2520Beginner%2527s%2520Guide.pdf&usg=AOvVaw1ggEQfggUXnMPjRAWN5pBd

	https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJiC6YQFjABegQIAhAB&url=http%3A%2F%2Findex-of.es%2FHack%2Frootkit-%2520Rootkits.for.Dummies%25202007.pdf&usg=AOvVaw2IRNmKHHN1BXe2nUYinhVF

NTFS Alternate Data Streams:

	https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/

	https://www.deepinstinct.com/2018/06/12/the-abuse-of-alternate-data-stream-hasnt-disappeared/

	https://www.2brightsparks.com/resources/articles/ntfs-alternate-data-stream-ads.html

	http://ntfs.com/ntfs-multiple.htm

Steganography:

	https://www.edureka.co/blog/steganography-tutorial

	https://null-byte.wonderhowto.com/how-to/guide-steganography-part-1-hide-secret-messages-images-0130797/

	https://www.barcodesinc.com/articles/guide-to-steganography.htm

	https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.pdf

Covering Tracks:

	https://www.dflabs.com/resources/blog/hacker-lifecycle-phase-5-covering-tracks-incman-soars-elimination-mechanisms/

	https://resources.infosecinstitute.com/penetration-testing-covering-tracks/#gref

	https://null-byte.wonderhowto.com/how-to/hack-like-pro-cover-your-tracks-leave-no-trace-behind-target-system-0148123/

	https://www.globalknowledge.com/ca-en/resources/resource-library/articles/the-5-phases-of-hacking-covering-your-tracks/

	