From 975b09dda4c2b5804a78c409f351d60f1be62a37 Mon Sep 17 00:00:00 2001 From: clem9669 <18504086+clem9669@users.noreply.github.com> Date: Tue, 2 Mar 2021 17:50:22 +0000 Subject: [PATCH] Update README.md Fixing typo error --- windows/active-directory-methodology/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/active-directory-methodology/README.md b/windows/active-directory-methodology/README.md index db072d083..646efd503 100644 --- a/windows/active-directory-methodology/README.md +++ b/windows/active-directory-methodology/README.md @@ -88,7 +88,7 @@ For this phase you need to have **compromised the credentials or a session of a ### Enumeration If you have some valid credentials or a shell as a domain user, **you should remember that the options given before are still options to compromise other users**. -Regarding [**ASREPRoast** ](asreproast.md)you can now find every possible vulnerable user, and regarding **\*\*\[**Password Spraying**\]\(password-spraying.md\) you can get a** list of all the usernames **and try the password of the compromised account \(if you know it\). It's very easy to obtain all the domain usernames from Windows \(`net user /domain` ,`Get-DomainUser`or `wmic useraccount get name,sid`\). In** linux\*\* you can use: `GetADUsers.py -all -dc-ip 10.10.10.110 domain.com/username` +Regarding [**ASREPRoast**](asreproast.md)you can now find every possible vulnerable user, and regarding [**Password Spraying**](password-spraying.md) you can get a **list of all the usernames** and try the password of the compromised account \(if you know it\). It's very easy to obtain all the domain usernames from Windows \(`net user /domain` ,`Get-DomainUser`or `wmic useraccount get name,sid`\). In** linux\*\* you can use: `GetADUsers.py -all -dc-ip 10.10.10.110 domain.com/username` Having compromised an account is a **big step to start compromising the whole domain**, because you are going to be able to start the **Active Directory Enumeration:**