This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Enumeration | |
# Credential Injection | |
runas.exe /netonly /user:<domain>\<username> cmd.exe | |
# enumeration users | |
users | |
net user /domain |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
======================================================================================================================== | |
Kerberos Attacks | |
======================================================================================================================== | |
[+] Kerbose attack | |
./GetUserSPNs.py -dc-ip 192.168.168.10 sittingduck.info/notanadmin |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
=======================HOST DISCOVERY=========================================== | |
Host discovery con PING: | |
$ for octect in (seq 0 254) | |
echo "Pinging [X.X.X.$octect]" | |
ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list | |
end | |
Host discovery con NMAP IMCP o ARP | |
$sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
##### (Cosmetic) Colour output | |
RED="\033[01;31m" # Issues/Errors | |
GREEN="\033[01;32m" # Success | |
YELLOW="\033[01;33m" # Warnings/Information | |
BLUE="\033[01;34m" # Heading | |
BOLD="\033[01;01m" # Highlight | |
RESET="\033[00m" # Normal | |
echo -e "${GREEN}" | |
##################################installation starts ###################################### |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
##### (Cosmetic) Colour output | |
RED="\033[01;31m" # Issues/Errors | |
GREEN="\033[01;32m" # Success | |
YELLOW="\033[01;33m" # Warnings/Information | |
BLUE="\033[01;34m" # Heading | |
BOLD="\033[01;01m" # Highlight | |
RESET="\033[00m" # Normal |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#LAST UPDATE: 30/03/2020 | |
#LAS CHANGE: added pkg-config. | |
RED='\033[0;31m' | |
GRN='\033[0;32m' | |
YLL='\033[1;33m' | |
NC='\033[0m' # No Color | |
#FILE NAMES | |
PTROOTDIR="pentestTools" | |
PTDIRS="{lists,tools,shells/{klbuiltin,}}" |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
NewerOlder