πŸ““
Sfoffo - Pentesting Notes
View on GitHub
  • 🏠/home/sfoffo/.pt-notes
  • 🏳️Contributions
    • 2024 Contributions
      • CVE-2024-42845
      • CVE-2024-41819
      • CVE-2024-41943
      • CVE-2024-50344
  • πŸ€Support this Project
  • πŸ“‚Active Directory
    • Initial Access
    • Internal Enumeration & Lateral Movement
    • Privilege Escalation to Domain Admin using Known Exploits
    • Domain Trusts
  • 🐧Linux Privilege Escalation
    • Enumerating Attack Vectors
    • Privileged Groups
    • Environment Variables Abuse
    • Capabilities Abuse
    • Programs, Jobs and Services
    • Miscellaneous Techniques
    • Recent CVEs
  • πŸͺŸWindows Privilege Escalation
    • Enumerating Attack Vectors
    • Excessive User Rights Abuse
    • Built-in Groups Abuse
    • File System ACLs
    • Services Hijacking
    • User Account Control (UAC) Bypass
    • Living off the Land
  • πŸ›Bug Bounty Hunting
    • Bug Bounty Tools
  • πŸ•ΈοΈWeb Applications
    • Web Attacks
      • Cross Site Scripting (XSS)
      • SQL Injection (SQLi)
      • File Upload Vulnerabilities
      • Insecure Direct Object References (IDOR)
      • OS Command Injection
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
      • XML External Entities (XXE)
      • HTTP Verb Tampering
    • Web Technologies
      • Tomcat
      • CGI Applications
      • WordPress
      • WebDav
      • Microsoft IIS
      • SAP Netweaver
      • Joomla
      • Drupal
      • Gitlab
      • Jenkins
      • osTicket
      • PRTG Network Monitor
      • Splunk
    • Fuzzing
  • πŸ”Information Gathering
  • πŸ“œProtocols and Services
    • DNS
    • FTP
    • IMAP
    • IPMI
    • MSSQL
    • MySQL
    • NFS
    • Oracle TNS
    • POP3
    • RDP
    • SMB
    • SMTP
    • SNMP
  • πŸ‘ΎUtilities, Scripts and Payloads
    • Shells and Payloads
    • Metasploit Framework
    • File Transfers
    • Pivoting, Tunneling, Port Forwarding
    • Password Attacks
Powered by GitBook
On this page
  • Active Directory Basics
  • Useful Resources

Was this helpful?

Edit on GitHub

Active Directory

Last updated 1 year ago

Was this helpful?

Active Directory Basics

Active Directory (AD) is a directory service for Windows network environments. AD provides authentication and authorization functions within a Windows domain environment. It's a hierarchical structure that allows for centralized management of an organization's resources

Resources in AD can be users, computers, groups, network devices, file shares, group policies, devices, and trusts. Any user in AD, regardless of their privileges, can be used to enumerate most objects within the AD environment.

Many features in AD are not secure by default and can be easily misconfigured. This weakness can be leveraged to move laterally and vertically within a network and gain unauthorized access.


Useful Resources

Learning Resources

Other Useful Resources & Cheatsheets

Active Directory Helper Tools

Tool
Description

Repository containing some of the following tools' pre-compiled binaries

PowerView is one of the main powershell tools to perform network and Windows domain enumeration and exploitation. It is useful for checking access, permissions, but also to enumerate potential users for Kerberoasting/ASREPRoasting attacks

Performs many functions. Noteably, pass-the-hash attacks, extracting plaintext passwords, and kerberos ticket extraction from memory on host.

Built-In Cmdlets to manage Active Directory domains, useful tool for enumeration

Sharpview is the C# version of PowerView

Visually map out AD relationships and help plan attack paths that may otherwise go unnoticed.

Data collector to gather information from Active Directory about varying AD objects such as users, groups, computers, ACLs, GPOs, user and computer attributes, user sessions, and more. The tool produces JSON files which can then be ingested into the BloodHound GUI tool for analysis.

A tool written in Go that uses Kerberos Pre-Authentication to enumerate Active Directory accounts and perform password spraying and brute forcing.

A collection of tools written in Python for interacting with network protocols. The suite of tools contains various scripts for enumerating and attacking Active Directory.

Tool to poison LLMNR, NBT-NS and MDNS, with many different functions.

Similar to Responder, a PowerShell tool for performing various network spoofing and poisoning attacks.

C# version of Inveigh with a semi-interactive console for interacting with captured data such as username and password hashes.

Tool that can be used to perform a variety of Active Directory enumeration tasks via the remote RPC service.

CME is an enumeration, attack, and post-exploitation toolkit. CME attempts to "live off the land" and abuse built-in AD features and protocols such as SMB, WMI, WinRM, and MSSQL.

C# tool built for Kerberos Abuse.

Impacket module geared towards finding Service Principal names tied to normal users. Useful for Kerberoasting attacks.

Tool for enumerating information from Windows and Samba systems.

Built in interface for interacting with the LDAP protocol.

A Python script used to enumerate AD users, groups, and computers using LDAP queries. Useful for automating custom LDAP queries.

DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain.

Tool to leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft's Local Administrator Password Solution (LAPS).

Tool for finding useful information and credentials in Active Directory on computers with accessible file shares.

Reads, modifies, and deletes the Service Principal Names (SPN) directory property for an Active Directory service account. Useful for a targeted kerberoasting attack

Remotely dump SAM and LSA secrets from a host.

Provides us with an interactive shell on host over the WinRM protocol.

Part of Impacket toolset, it provides the ability to interact with MSSQL databases.

Exploit combo using CVE-2021-42278 and CVE-2021-42287 to impersonate Domain Admin from standard domain user.

Part of the Impacket toolset, it performs SMB relay attacks.

Tool for manipulating certificates and TGTs.

A tool for enumeration and dumping of DNS records from a domain. Similar to performing a DNS Zone transfer.

Extracts usernames and passwords from Group Policy preferences.

Attempt to list and get TGTs for those users that have the property 'Do not require Kerberos preauthentication' set.

SID bruteforcing tool.

A tool for creation and customization of TGT/TGS tickets.

Part of the Impacket toolset, It is a tool for child to parent domain privilege escalation.

AD viewer and editor that can be used to navigate an AD database and view object properties and attributes. It can also be used to save a snapshot of an AD database for offline analysis.

Used for auditing the security level of an AD environment

Group3r is useful for auditing and finding security misconfigurations in AD Group Policy Objects (GPO).

A tool used to extract various data from a target AD environment.

A Python-based BloodHound ingestor based on the . It supports most BloodHound collection methods and can be run from a non-domain joined attacker host. The output can be ingested into the BloodHound GUI for analysis.

πŸ“‚
https://book.hacktricks.xyz/windows-hardening/active-directory-methodology#basic-overview
https://www.hackthebox.com/blog/active-directory-penetration-testing-cheatsheet-and-guide
https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/kerberos-authentication
https://academy.hackthebox.com/module/details/74
https://www.geeksforgeeks.org/active-directory-pentesting/
https://wadcoms.github.io/
https://github.com/geeksniper/active-directory-pentest
Ghostpack Compiled Binaries
PowerView
Mimikatz
Active Directory Built-In PowerShell Module
SharpView
BloodHound
SharpHound
BloodHound.py
Impacket toolkit
Kerbrute
Impacket toolkit
Responder
Inveigh.ps1
C# Inveigh (InveighZero)
rpcclient
CrackMapExec (CME)
Rubeus
GetUserSPNs.py
enum4linux-ng
ldapsearch
windapsearch
DomainPasswordSpray.ps1
LAPSToolkit
Snaffler
setspn.exe
secretsdump.py
evil-winrm
mssqlclient.py
noPac.py
ntlmrelayx.py
gettgtpkinit.py
adidnsdump
gpp-decrypt
GetNPUsers.py
lookupsid.py
ticketer.py
raiseChild.py
Active Directory Explorer
PingCastle
Group3r
ADRecon