Active Directory
Here you will find a detailed CheatSheet for Active Directory
Enumeration and Exploitation
RPC Enumeration
# Login using a NULL Session with RPCClient
rpcclient -U "" -N <IP>
# (Authenticated) Login to RPC using RPCClient
rpcclient -U "<User>" <IP>
Password for [WORKGROUP\<User>]: <Pass>
# Commands ->
> enumdomusers # List domain users
> enumdomgroups # List domain groups
> queryuser <RID> # Info about a user (RID from enumdomusers)
> querygroup <RID> # Info about a group
> querygroupmem <RID> # Group membership
> getusername # Current session username
> getdompwinfo # Password policy
> getdomusers # Sometimes shows full list (legacy domains)
> srvinfo # System info (OS, domain, DC name, etc.)LDAP Enumeration
Kerberos Enumeration
SMB Enumeration
LLMNR/NBT-NS Poisoning — Linux
LLMNR/NBT-NS Poisoning — Windows
User enumeration with Enum4linux
Certipy Enumeration
BloodyAD Enumeration
DCSync
Pass-TheHash
WinRM
Enumeration with BloodHound-python
Enumeration with BloodHound
Internal password spraying — Windows
Privilege Escalation
SeBackupPrivilege Abuse
Winpeas
Microsoft Azure AD Sync
Enumerating Security Controls
Authenticated enumeration from powershell
PowerView commands
Snaffler
Basic Enumeration Commands — Windows
LAPS Abuse
ACE Abuse
ACL Enumeration
ACL Abuse
Last updated