Enumeration following after initial credentials are gained
runas
and gain local administrative permissions viarunas.exe /netonly /user:%FQDNORNETBIOSDOMAIN%\%USERNAME% cmd.exe
SYSVOL
, it stores Group Policy Objects (GPO). Every AD account will gain access$dnsip = "<DC IPaddress>"
$index = Get-NetAdapter -Name '<Ethernet>' | Select-Object -ExpandProperty 'ifIndex'
Set-DnsClientServerAddress -InterfaceIndex $index -ServerAddresses $dnsip
* Check `SYSVOL` afterwards via `hostname` to verify via Kerberos auth
dir \\%HOSTNAME%\SYSVOL\
* Check `SYSVOL` via `IP` address to force `NTLM` authentication
Remote Server Administrative Tools
RSAT
-> Select RSAT: Active Directory Domain Services and Lightweight Directory Tools
-> InstallWin
+ r
-> MMC
-> File -> Add/Remove Snap-in -> add 3 AD feature snap-ins -> right click Active Directory Sites and Services
-> Change Forest
-> Add root domain -> right click Active Directory Users and Computers
-> Change Domain -> enter root domain -> right click Active Directory Users and Computers
-> View -> Advanced FeaturesPeople
directory -> right click on them to see propertiesMMC
to enumerate Execute from domain joined machine
net user /domain
net user <username> /domain
net group /domain
net group <groupname> /domain
net accounts /domain
Get-ADUser -Identity <username> -Server <fqdn/or/DCdomain> -Properties *
Get-ADGroup -Identity Administrators -Server exampleDC.com -Properties *
Get-ADGroupMember -Identity Administrators -Server exampleDC.com
Get-ADObject -Filter <filterstuff> -includeDeletedObjects -Server exampleDC.com
Get-ADObject -Filter 'badPwdCount -gt 0' -Server exampleDC.com
Get-ADDomain -Server exampleDC.com
Change to AD user via runas.exe
and collect via one of the following
For example
Sharphound.exe --CollectionMethods <Default/Session/All> --Domain example.com --ExcludeDCs
Sharphound.exe --CollectionMethods Session --Domain example.com --ExcludeDCs
neo4j console start
bloodhound --no-sandbox
Analysis
to find an attack path through the info on the edgesAnalysis
tab, for example kerberroastable accounts
Social_engineering