AD Methodology
Workflow to Follow for AD.
Enumeration
Nmap scan:
Enumeration of SMB:
Enumeration of share permissions:
Connection to shares
Time Skew
Net Command
Gather user information
Get all users in the domain
Get user information
Get all groups in the domain
Get group information
Get all local group
Get all users in the local group
Get account policy
Gather Domain information
Get domain information
Powershell script to craft the LDAP path
Powerview Commands
Import Module
Get domain information
Get all user information
Get all user information but specific column
Get Service principal name
Get all group information
Get specific group information
Get group information but specific column
Get computer information
Find all computer that has local admin rights for current user
Convert Security Identifiers (SID) to name
Get object ACL
Get Active Directory Rights for a specific domain group
List down all domain shares
List down all domain shares with access
Network Shares
List down all shares for specific server
Enumerating SPNs (Service Principal Names)
Automated Enumeration
Importing SharpHound
Get Help Command
Collect all data
Cached AD Credentials
Dumping out the credentials of all logged-on users (mimikatz)
Show all the tickets that are stored in the memory (mimikatz)
Cached Hashes (mimikatz)
Authentication Attacks
Password Attacks
Password Spray using powershell script according to account policy
Password Spray against AD Users using SMB
Password Spray using TGT
AS-REP Roasting
Get all users without Kerberos preauthentication
Cracking the Hash
Kerberoasting
Get all SPNs that able to be Kerberoasted
Cracking the hash
Sliver Tickets
SPN Password hash
Domain SID
The full command
To check
Domain Controller Synchronization (DCSync)
Crack the hash
Lateral Movement Techniques
WMI and WinRM
Testing phase
To execute
PsExec
Pass the Hash
Overpass the hash
Find the cached password hashes
Create the process
Generate the ticket for targeted machine
Entering the system
Pass the Ticket
Export out all the TGT/TGS from memory
List out all the generated tickets
Reinject the ticket
DCOM (Distributed Component Object Model)
Persistence Methods
Golden Ticket
If the account is in the Domain Admin group
To purge any old tickets
To inject the ticket
Shadow Copies
Create a snapshot
Copy AD Database to C: drive root folder
Save the SYSTEM hive from Windows registry
Dump all the NTML hashes
Bloodhound Custom Queries
https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.htmlbloodhound.readthedocs.io
Return all users in the domain
Return all active session in the domain
Return all the users' group membership
Using evil-winrm to get shell
Using Password
Using NTLM Hash
Referrences
Last updated
