AD
AD Reconnaissance
net userwhoamiwhoami /groupsnet user /domainnet user [username] /domainGet-ADUser -filter {name -like "sys.varonis.sql*"} -Properties *$ldapFilter = "(&(objectClass=user)(objectCategory=user)(servicePrincipalName=*))"
$domain = New-Object System.DirectoryServices.DirectoryEntry
$search = New-Object System.DirectoryServices.DirectorySearcher
$search.SearchRoot = $domain
$search.PageSize = 1000
$search.Filter = $ldapFilter
$search.SearchScope = "Subtree"
$results = $search.FindAll()
$Results = foreach ($result in $results) {
$result_entry = $result.GetDirectoryEntry()
$result_entry | Select-Object @{ Name = "Username"; Expression = { $_.sAMAccountName }}, @{ Name = "SPN"; Expression = { $_.servicePrincipalName | Select-Object -First 1 }}
}
$ResultsDomain Discovery
Kerberos Reconnaissance - PRE-Auth
AS-REP Roasting
Rubeus on Windows
Crack AS-REP hashes with hashcat
Mimikatz Commands
Metasploit Commands
Golden and Silver Tickets
DCSync
Kerberoasting from Linux
Crackmapexec Commands
Hashcat hash cracking
John the Ripper hash cracking
Powershell Commands
Hash Extraction and Ticket Management
Active Directory Reconnaissance
Domain Discovery Commands
Metasploit and Kerberoasting
Kerberoasting from Linux
Kerberoasting from Windows
CrackMapExec Commands
Powershell Command
Last updated