Active Directory Methodology
TIP: When you want to transfer files and scripts within an enterprise network using HTTP, ONLY USE PORTS 80 AND 443 because firewalls deny traffic from other ports by default and activity blends better with legitimate traffic.
TIP 2: When you find credentials for an account, check if these credentials are reused across multiple machines with various protocols.
netexec smb IP_RANGE -u USER -p PASSWORDTIP 3: If you gain administrator access on any host, EXTRACT EVERYTHING! (LSASS, SAM AND SYSTEM HIVES, ETC)
TIP 4: When you want to do lateral movement, start with WinRM or PSSession — they’re modern and often enabled by default. Fall back to WMI when stealth is important or WinRM is blocked. Avoid PsExec unless necessary — it’s often monitored or flagged. Use RunAs for local user switching, not lateral movement.
1) Unauthenticated
kerbrute userenum -d DOMAIN --dc DC_IP users.txt kerbrute userenum -d DOMAIN --dc DC_IP xato-10million-users.txt netexec smb IP -u anonymous -p '' --rid-brute > rid.txt
cat rid.txt | grep SidTypeUser | awk '{print $6}' | awk -F\ '{print $2}' > users.txt2) Valid Username Only
3) Valid Credentials (Assumed Breach Scenarios)
TIP: If NTLM does not work for pass-the-hash scenarios or you dont have any clear-text credentials for lateral movenemt/initial access, use Kerberos ticket to authenticate.
Last updated