๐Advanced Penetration Testing
Remote extraction of AD hashes
Import-Module DSInternals
$cred=Get-Credential
Get-ADReplAccount -SamAccountName <victim username> -Server <Domain IP> -Credential $cred -Protocol TCPCarry out a Kerberos roasting
python3 GetNPUsers.py <domain/> -dc-ip <domain ip> -usersfile <username.txt> -format hashcatCrack the Hash
john <hash file> --wordlist=/usr/share/wordlists/rockyou.txtRun a no-preauthentication attack
Forge a golden ticket (Post Exploitation)
Prerequisite
Must be a local admin before doing this attack
Get the NT hash of Kerberos TGT
Extract the Domain SID
Forge the Golden-Ticket
Use the Golden-Ticket
Running a shadow attack
Certipy Tool
Pass The Hash Attack
Taking over the domain using rubeus (Privilege Escalation)
Identify a Vulnerable Certificate Template
Request the Certificate
Convert .pem file to .pfx file
Rubeus
Change the Domain Admin Password
Relaying attacks to get a certificate
DFSCoerce
Set up a Man-In-The-Middle relay server
Using DFSCoerce
Decode the Certificate
Extract the Private Key hash
Using smartcards to gain privileged access
Create a Smartcard
PoshADCS
PowerView
Execute PowerView
Execute PoshADCS
Check the Access level
Requtst for Domain Admin
Check the virtual smart card
Set the BloodHound loose
Start neo4j
Change the Credentials for neo4j
Run BloodHound
Last updated
Was this helpful?