AD Related
Enumeration
Basic ldap enumeration
LDAP Queries
Get all the users
Dump ldap fully
AS-Rep Roasting
If a user has pre auth enabled, you grab his/her hash
Bruteforcing - Password Spraying
Kerbrute
Kerberos(port 88) bruteforcing
DC Shadow
-This is a persistence attack-
DC Shadow attack aims to inject malicious Domain Controlllers into AD infrastructure so that we can dump actual AD members.
Find sid for that user
This will create a RPC Server and listen
Run this from another mimikatz
After this, unregistration must be done. Relogin now and perform DCSync
DC Sync
Using mimikatz,
Using DCSync.ps1,
Using secretdumps module from impacket,
Domain Trust
We get current domain or target domain sid using Get-DomainSID
Golden Ticket
Use krbtgt's hash and you can forge tickets for anyone.
Get krbtgt hash,
You might want to patch it
Forging the ticket
/rc4 or /krbtgt -> krbtgt hash
/sid -> Get-DomainSID
/ticket -> this parameter is optional but default is ticket.kirbi
/groups -> this parameter is optional but default is 513,512,520,518,519
/ptt -> switch to perform ptt
After this, your final ticket should be ready. You can also verify by using the following command that it is in your cache.
You can now verify it is working.
purge it
If you want to use metasploit
Silver Ticket
Service accounts
ticketer,
Last updated