mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-12 22:33:00 +00:00
Update Active Directory Attack.md
Find AD
This commit is contained in:
parent
e386a110d9
commit
310338b279
1 changed files with 7 additions and 2 deletions
|
@ -460,10 +460,15 @@ Replace the customqueries.json file located at `/home/username/.config/bloodhoun
|
|||
|
||||
### Other Interesting Commands
|
||||
|
||||
- **Find Domain Controller**
|
||||
- **Find Domain Controllers**
|
||||
```ps1
|
||||
nslookup domain.com
|
||||
nslookup -type=srv _ldap._tcp.dc._msdcs.<domain>.com
|
||||
nltest /dclist:domain.com
|
||||
Get-ADDomainController -filter * | Select-Object name
|
||||
gpresult /r
|
||||
$Env:LOGONSERVER
|
||||
echo %LOGONSERVER%
|
||||
```
|
||||
|
||||
## Most common paths to AD compromise
|
||||
|
@ -3863,4 +3868,4 @@ CME 10.XXX.XXX.XXX:445 HOSTNAME-01 [+] DOMAIN\COMPUTER$ 31d6cfe0d16ae
|
|||
* [Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) - Oliver Lyak](https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4)
|
||||
* [bloodyAD and CVE-2022-26923 - soka - 11 May 2022](https://cravaterouge.github.io/ad/privesc/2022/05/11/bloodyad-and-CVE-2022-26923.html)
|
||||
* [DIVING INTO PRE-CREATED COMPUTER ACCOUNTS - May 10, 2022 - By Oddvar Moe](https://www.trustedsec.com/blog/diving-into-pre-created-computer-accounts/)
|
||||
* [How NOT to use the PAM trust - Leveraging Shadow Principals for Cross Forest Attacks - Thursday, April 18, 2019 - Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2019/04/abusing-PAM.html)
|
||||
* [How NOT to use the PAM trust - Leveraging Shadow Principals for Cross Forest Attacks - Thursday, April 18, 2019 - Nikhil SamratAshok Mittal](http://www.labofapenetrationtester.com/2019/04/abusing-PAM.html)
|
||||
|
|
Loading…
Reference in a new issue