Active Directoy

Active Directory is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only in charge of centralized domain management.

-- Wikipedia

Target

  • Domain Admins group

  • Domain Controller

General

Display permissions using PowerShell

dsacls "DC=<domain>,DC=<domain>"

net

List local accounts

List domain accounts

Details about specific user

List domain groups

Show domain's account policy

DC sync attack

DC Sync Attacks With Secretsdump.py - YouTube

Alternative approach (probably gets flagged by AV) Copy & execute mimikatz.exe on DC

Pre-Auth attack

Getting Passwords When Kerberos Pre-Auth IS Enabled - YouTube 1. sniff KRB auth packet 2. crack using hashcat

-> If no pre auth is required, just use Impacket to pull hashes from AD.

BloodHound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. GitHub - BloodHoundAD/BloodHound

Gather information (on target)

OR

Copy generated *BloodHound.zip

OR

Analyze data (on kali)

Connect to database

Import data Upload Data select .csv, .json or .zip file(s)

Last updated