Enumeration

NOTE: Goal is to privilege escalate to Domain Administrator

Initial Access

RDP

xfreerdp3 /u:'<Username>' /d:'<Domain Name>' /p:'<Password>' /v:<Target IP Address> /dynamic-resolution +clipboard /drive:/home/kali/offsec/downloads,/shared

Enumeration

Manual

NOTE: Make sure to run the following!

powershell -ep bypass

Get users on domain

net user /domain

Get info on particular user

net user <Username> /domain

Get groups on domain

net group /domain

Get info on particular CUSTOM group

PowerView

NOTE: Remember to run the following

Enumerate Users in the Domain

To get filtered result

EXAMPLE:

Get-NetUser | select samaccountname, cn, pwdlastset, lastlogon

To get specific information of a particular user

Enumerate Groups in the Domain

To get filtered result

EXAMPLE:

Get-NetGroup | select cn

To get specific information of a particular group

Enumerate Computers in the Domain

To get filtered result

EXAMPLE:

Get-NetComputer | select operatingsystem, dnshostname

To get specific information of a particular computer

To look for administrative rights on other computer for the current user

To look for logged on users on target machine

NOTE: If something is not right check for permission.

Permissions for NetSessionEnum are defined in SrvsvcSessionInfo registry key (HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity)

Alternatives

NOTE: Remote machine must have Remote Registry service enabled

To check for permission

EXAMPLE:

Get-Acl -Path HKLM:SYSTEM\CurrentControlSet\Services\LanmanServer\DefaultSecurity\ | fl

To enumerate Service Principal Name

To enumerate ACEs

NOTE: Look out for ActiveDirectoryRights and SecurityIdentifier

To enumerate interesting ACL

To enumerate all user that has ActiveDirectoryRights = GenericAll under a group

To enumerate all ActiveDirectoryRights = GenericWrite under a group

To convert SID to Name in bulk

To convert SID to Name individually

Add user into group in domain

To enumerate all shares on Domain

To enumerate shares available to current user

To enumerate Group Policy

EXAMPLE:

Get-GPO -Name "Default Domain Policy"

To enumerate permission on the group policy

NOTE: Only if the permission either contains "ModifySecurity" or "FullControl"

BloodHound

To import BloodHound

To begin enumerationg on BloodHound

On kali:

NOTE: Head over to http://localhost:7474

Username: neo4j

Password: arctic-iris-zipper-prism-courage-7161

Last updated