githubEdit

Credentialed Enumeration List

Command
Description

xfreerdp /u:forend@inlanefreight.local /p:Klmcargo2 /v:172.16.5.25

Connects to a Windows target using valid credentials. Performed from a Linux-based host.

sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --users

Authenticates with a Windows target over smb using valid credentials and attempts to discover more users (--users) in a target Windows domain. Performed from a Linux-based host.

sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --groups

Authenticates with a Windows target over smb using valid credentials and attempts to discover groups (--groups) in a target Windows domain. Performed from a Linux-based host.

sudo crackmapexec smb 172.16.5.125 -u forend -p Klmcargo2 --loggedon-users

Authenticates with a Windows target over smb using valid credentials and attempts to check for a list of logged on users (--loggedon-users) on the target Windows host. Performed from a Linux-based host.

sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --shares

Authenticates with a Windows target over smb using valid credentials and attempts to discover any smb shares (--shares). Performed from a Linux-based host.

sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 -M spider_plus --share Dev-share

Authenticates with a Windows target over smb using valid credentials and utilizes the CrackMapExec module (-M) spider_plus to go through each readable share (Dev-share) and list all readable files. The results are outputted in JSON. Performed from a Linux-based host.

smbmap -u forend -p Klmcargo2 -d INLANEFREIGHT.LOCAL -H 172.16.5.5

Enumerates the target Windows domain using valid credentials and lists shares & permissions available on each within the context of the valid credentials used and the target Windows host (-H). Performed from a Linux-based host.

smbmap -u forend -p Klmcargo2 -d INLANEFREIGHT.LOCAL -H 172.16.5.5 -R SYSVOL --dir-only

Enumerates the target Windows domain using valid credentials and performs a recursive listing (-R) of the specified share (SYSVOL) and only outputs a list of directories (--dir-only) in the share. Performed from a Linux-based host.

rpcclient $> queryuser 0x457

Enumerates a target user account in a Windows domain using its relative identifier (0x457). Performed from a Linux-based host.

rpcclient $> enumdomusers

Discovers user accounts in a target Windows domain and their associated relative identifiers (rid). Performed from a Linux-based host.

psexec.py inlanefreight.local/wley:'transporter@4'@172.16.5.125

Impacket tool used to connect to the CLI of a Windows target via the ADMIN$ administrative share with valid credentials. Performed from a Linux-based host.

wmiexec.py inlanefreight.local/wley:'transporter@4'@172.16.5.5

Impacket tool used to connect to the CLI of a Windows target via WMI with valid credentials. Performed from a Linux-based host.

windapsearch.py -h

Used to display the options and functionality of windapsearch.py. Performed from a Linux-based host.

python3 windapsearch.py --dc-ip 172.16.5.5 -u inlanefreight\wley -p Klmcargo2 --da

Used to enumerate the domain admins group (--da) using a valid set of credentials on a target Windows domain. Performed from a Linux-based host.

python3 windapsearch.py --dc-ip 172.16.5.5 -u inlanefreight\wley -p Klmcargo2 -PU

Used to perform a recursive search (-PU) for users with nested permissions using valid credentials. Performed from a Linux-based host.

sudo bloodhound-python -u 'forend' -p 'Klmcargo2' -ns 172.16.5.5 -d inlanefreight.local -c all

Executes the python implementation of BloodHound (bloodhound.py) with valid credentials and specifies a name server (-ns) and target Windows domain (inlanefreight.local) as well as runs all checks (-c all). Runs using valid credentials. Performed from a Linux-based host.

Last updated