These may be exposed to the Internet. For example
Use these applications to either brute force / spraying passwords to found IDs or to verify previously aquired IDs and their passwords
dpkg-reconfigure -p low slapd
* Skip reconfiguration -> No
* Insert DNS domain and organisation
* Provide password
* Select `MDB` as database
* No removal when db is purged
* Move old database when creating a new one
* Downgrade authentication via `*.ldif` file
dn: cn=config
replace: olcSaslSecProps
olcSaslSecProps: noanonymous,minssf=0,passcred
* Patch and reload ldap
sudo ldapmodify -Y EXTERNAL -H ldapi:// -f ./olcSaslSecProps.ldif && sudo service slapd restart
* Check via
ldapsearch -H ldap:// -x -LLL -s base -b "" supportedSASLMechanisms
SMB
auth, or do a MITMsudo responder -I <interface>
hashcat
to crack the hasheshashcat -m 5600 hash.txt rockyout.txt --force
SMB
signing must not be enforced, either on or offLoad and install OS via network
MDT
provisions PXE boot imagesDHCP
is the validation step, PXE will be delivered by MDT
Retrieve/enumerate images via TFTP
Create an admin account after OS installation
Password scraping to recover AD creds used during OS installation
Use PowerPXE.ps1
to extract *.bcd
files
winpeas.sh
or seatbelt
Social_engineering