Active Directory
Attack Workflow
Determine what ports are open
Enumerate with
Enumerate AD information
Domain info
rpcclient
enum4linux
Get list of users
If list not available, bruteforce usernames
Determine if kerberos pre-auth exists
Determine which users have SPNs (Service Principle Names)
enum4linux
Used to enumerate a huge amount of AD information from the command line.
rpcclient
Used to enumerate information about system over RPC
Gather a list of accounts with rpcclient
and save
Password Spraying
Using a tool such as Talon can run password spray attacks across an AD env
Kerberos
Kerbrute, used to run various kerberos attacks. Written in Go. https://github.com/ropnop/kerbrute
Kerberoasting
Using a valid account on a pwned box, we can gather tickets for service accounts and extract the hash to crack. We must find all accounts in AD which have a SPN (Service Principle Name), then request RC4 tickets from the DC.
secretsdump
Used to extract hashes from a server. Below command will get NTDS.dit, assuming that you have an account with those permissions.
https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svg
Last updated