The Nen-Book
LinkedinTwitterMediumGithubHTB
  • Whoami
  • Walkthroughs & Writeups
    • My CTF Methodology
    • Hack The Box Machines
      • Administrator
      • Escape two
      • Cicada
      • HTB Permx Machine(CVE-2023–4220 Chamilo LMS)
    • Intigriti 1337Up 2024
      • Intigriti 1337Up 2024-CTF OSINT Challenges
      • Intigriti 1337Up Live 2024-CTF Web Challenges
    • CyCTF Quals 2024
      • OSINT Challenges CyCTF Quals 2024
      • Old Friend OSINT Challenge CyCTF 2024 Quals Writeup
    • PicoCTF
      • PicoCTF 2024 Web Exploitation Challenges
      • PicoCTF 2024 General Skills Challenges
      • PicoCTF 2021 Web Exploitation Challenges Walkthrough
      • PicoCTF 2019 Web Exploitation Challenges
  • Web_AppSec
    • Web_Recon
    • SQli
    • ATO
    • Backend_Technology_Tricks
    • XSS
    • SSRF
    • CSRF
    • XXE
    • SSTI
    • Insecure_Deserialization
    • Open_Redirects
    • Information_Disclosures
    • Rate_Limiting
    • Clickjacking
    • Broken Access Control & IDORS
    • Bash_Scripting
    • Authentication_Vulnerabilities
    • App_Logic_Errors
  • Network & AD Pentesting
    • Scanning & Enumeration
    • Active_Directory
      • AD_Overview_&_ Lab Build
      • AD_Initial_Attack_Vectors
      • AD_Post-Compromise_Enumeration
      • AD_Post-Compromise_Attacks
    • Buffer_Overflow_Attacks
    • Web_Applications
    • Privilege_Escalation
  • Cloud_Security
    • AWS Pentesting
  • APISec
    • API_Recon
    • Broken_Access_Control & Info_Leaks
  • Code_Review
    • Source_Code_Review_101
    • Code Review Tools
  • Bug_Hunting
    • Picking_A_BugBounty_Program
    • Writing_A_Good_Report
  • MITRE ATT&CK
    • Introducing the ATT&CK Framework
    • MITRE Engenuity
    • Threat-Informed Defense
Powered by GitBook
On this page
  • PowerView
  • Bloodhound

Was this helpful?

Edit on GitHub
  1. Network & AD Pentesting
  2. Active_Directory

AD_Post-Compromise_Enumeration

PreviousAD_Initial_Attack_VectorsNextAD_Post-Compromise_Attacks

Last updated 5 months ago

Was this helpful?

  • We have compromised a user account as we get FrankCastle user and it’s hash ( with Responder) and crack it and get on Machines using SMB relay without getting the hash and we able to dump SAM file and collect hashes in that way after we have compromise the next it to enumerate the network using compromises .

  • PowerView tool (Power shell tool) : allows us to look at the network and to enumerate basically the domain controller , domain policy and etc.

  • Bloodhound tool : visualize what is going in the network and where we can find sensitive user that might be log in and where we can find shortest path to get the domain admin.

PowerView

  • Download the tool :

  • Useful Resource for powerview :

  • Running powerview from directly any windows machine we have , for attacker situation if he has access to a shell then we ‘ll use that shell and we ‘re going to load powershell.

  • Bypass execution policy using powershell - Ready for executing scripts :

  • Up powerview to enumerating the domain :

  • Get information about the domain ( where are domain controllers and much more) :

  • Get information about domain controllers ( Name , ip and much more) :

  • Get the domain policy :

  • Get detailed information about system access of the policy ( Note the Minimum password length and how to use this information or password complexity all these information open ways for hacker) :

  • Get net users ( Get data about users in domains , you can find interesting description with passwords sometimes ) :

    • Filtering outputs to do it more easily.

  • Get the property the user might have :

    • Get a specific property of item we want ( like password last list).

    • logoncount property which can identify honeybot accounts.

    • Get how many bad password to see if any of these accounts is under attack ( many trials on it ).

  • List all computers on the domain :

    • for more information and as before you select specific property like OperatingSysetm ( Greb feature).

  • Get information about groups :

                                          **Get all admin groups using wild card.**
    • Get information about specific member in the group.

  • Get all SMB sharing in the network :

  • Get all group policy :

Bloodhound

  • Download Invoke-Bloodhound :

  • Download a data of AD ( when we are on a machine or network ) and visualize data on the graph.

  • Run a tool called neo4j and we should to set it up - change default credentials- Go to local host to change default password for more security :

  • Invoke-Bloodhound : power shell tool using for grabbing data - Downloading this file on Windows 10 machines ( which you get access from previous stage).

    • To be able to use scripts :

    • Running sharphound :

    • Running the script to get data collection from specific domain - Get this file copied to kali machine :

  • Now we have our data transferred from our windows machine ( we get in the last phase) to Bloodhound - Processing all json file :

    • Here we find out the shortest path to Domain admins . Here , we should have session on the punisher machine which has it local admin and this will lead us to DOMAIN ADMINS @MARVEL.LOCAL ( our domain admin) + Have session now unlike spiderman machine. [ Token impersenation ] .

  • We always do enumeration after each step and ask what information is here for us after we got access we enumerate and still in this cycle as every step you do , you have more information to know about.

  • After compromising one account what can we do with that account?

powershell/SharpHound.ps1 at master · puckiestyle/powershell
PowerView-3.0 tips and tricks
Active Directory Enumeration With PowerView
198.jpg
199.jpg
200.jpg
201.jpg
202.jpg
203.jpg
204.jpg
205.jpg
206.jpg
207.jpg
208.jpg
209.jpg
210.jpg
211.jpg
212.jpg
213.jpg
214.jpg
215.jpg
217.jpg
218.jpg
219.jpg
220.jpg
221.jpg
22.jpg
222.jpg
223.jpg