AD Related

Enumeration

Basic ldap enumeration

LDAP Queries

Get all the users

Dump ldap fully

AS-Rep Roasting

If a user has pre auth enabled, you grab his/her hash

Bruteforcing - Password Spraying

Kerbrute

Kerberos(port 88) bruteforcing

DC Shadow

-This is a persistence attack-

DC Shadow attack aims to inject malicious Domain Controlllers into AD infrastructure so that we can dump actual AD members.

Find sid for that user

This will create a RPC Server and listen

Run this from another mimikatz

After this, unregistration must be done. Relogin now and perform DCSync

DC Sync

Using mimikatz,

Using DCSync.ps1,

Using secretdumps module from impacket,

Domain Trust

We get current domain or target domain sid using Get-DomainSID

Golden Ticket

Use krbtgt's hash and you can forge tickets for anyone.

Get krbtgt hash,

You might want to patch it

Forging the ticket

  • /rc4 or /krbtgt -> krbtgt hash

  • /sid -> Get-DomainSID

  • /ticket -> this parameter is optional but default is ticket.kirbi

  • /groups -> this parameter is optional but default is 513,512,520,518,519

  • /ptt -> switch to perform ptt

After this, your final ticket should be ready. You can also verify by using the following command that it is in your cache.

You can now verify it is working.

purge it

If you want to use metasploit

Silver Ticket

Service accounts

ticketer,

Last updated