githubEdit

No Credentials

1) Do reconnaissance for live hosts within a network

Scan an IP range

nxc smb IP_RANGE

Scan all TCP ports of a machine

sudo rustscan -a IP -r 1-65535 -- -A -Pn -oA

Scan UDP ports

sudo nmap -sU --top-ports 100 -vvv IP -oA

Analyze the scan output. If we find a domain, make an entry in the hosts file

sudo nano /etc/hosts
IP  domain.local

If SMB is signed but not enabled, or neither, check if you can do relay attacks.

2) Do reconnaissance for credentials (users and passwords)

SMB

Check SMB information for null session and guest access, as well as general information about the machine

enum4linux-ng IP

Check for null session and/or guest access for SMB share access

nxc smb domain.local -u '' -p '' --shares
nxc smb domain.local -u guest -p '' --shares

TIP: Guest might have access where null has not!

Dump all valid users in the domain via RID cycling

Parse results

Kerberos

If we find a list of usernames, check if these usernames are valid

If we have no hints for finding a username list, we can enumerate using a specific wordlist

LDAP

Enumerate the domain via LDAP

Enumerate users

Enumerate user descriptions (check for sensitive information like passwords, etc.)

HTTP

Enumerate directories

Enumerate subdomains

DNS

Do a DNS Zone transfer

3) NTLM Hash Stealing

Generate a malicious payload

Activate responder

Upload a .lnk file or any other file generated by ntlm_theft, depending on use case on an SMB share, or inside the machine

Check Responder after a few minutes, then crack the NTLMv2 hash

4) Timeroasting

Do a timeroasting attack to extract hashes from machine accounts

Crack hashes

Last updated