windowsActive Directory

Here you will find a detailed CheatSheet for Active Directory

Enumeration and Exploitation

RPC Enumeration

# Login using a NULL Session with RPCClient
rpcclient -U "" -N <IP> 
# (Authenticated) Login to RPC using RPCClient
rpcclient -U "<User>" <IP>
Password for [WORKGROUP\<User>]: <Pass>
# Commands ->
> enumdomusers             # List domain users
> enumdomgroups            # List domain groups
> queryuser <RID>          # Info about a user (RID from enumdomusers)
> querygroup <RID>         # Info about a group
> querygroupmem <RID>      # Group membership
> getusername              # Current session username
> getdompwinfo             # Password policy
> getdomusers              # Sometimes shows full list (legacy domains)
> srvinfo                  # System info (OS, domain, DC name, etc.)

LDAP Enumeration

Kerberos Enumeration

SMB Enumeration

LLMNR/NBT-NS Poisoning — Linux

LLMNR/NBT-NS Poisoning — Windows

User enumeration with Enum4linux

Certipy Enumeration

BloodyAD Enumeration

DCSync

Pass-TheHash

WinRM

Enumeration with BloodHound-python

Enumeration with BloodHound

Internal password spraying — Windows

Privilege Escalation

SeBackupPrivilege Abuse

Winpeas

Microsoft Azure AD Sync

Enumerating Security Controls

Authenticated enumeration from powershell

PowerView commands

Snaffler

Basic Enumeration Commands — Windows

LAPS Abuse

ACE Abuse

ACL Enumeration

ACL Abuse

Last updated