๐Ÿ”งTesting Active Directory

Tools

Load DSInternals using Powershell

Install Impacket in Linux

Install BloodHound in Linux

Install Kerbrute

Install Crackmapexec


Extract the AD hashes


Password spraying Active Directory


Kerberos brute-forcing attacks

Kerbrute

Username Enumeration

Password Attack


CrackMapExec to access and enumerate AD

Pass The Hash Attack


Investigate the SYSVOL share

Retrieve a File


Take advantage of legacy data

Jxplorer

  • Open Jxplorer

  • Enter username and password

  • Select a user

  • Select Table Editor Column at the right hand side

  • Decode the Info value (base64 encoded)

Decode Base64 value

Last updated

Was this helpful?