Contents
** 1. Initial Enumration and Identification **#
a. netexec User Enumration#
sudo netexec smb <dc-ip> -u 'dotpirate' -p 'l3tsh4ck!' --users
Using netexec to enumerate domain users
b. netexec Group Enumeration#
sudo netexec smb <dc-ip> -u 'dotpirate' -p 'l3tsh4ck!' --groups
Using netexec to enumerate domain groups
c. netexec Logged on User Enumeration#
sudo netexec smb <dc-ip> -u 'dotpirate' -p 'l3tsh4ck!' --loggedon-users
Check what user are logged on the server at that time
d. netexec SMB Share Enumeration#
sudo netexec 10.10.10.0/24 smb -u 'dotpirate' -p 'l3tsh4ck!' --shares
Check if our user has access to any shares
e. Bloodhound (Legacy)#
sudo neo4j
sudo ./Bloodhound
sudo bloodhound-python -u 'dotpirate' -p 'l3tsh4ck!2' -ns <dc-ip> -d dotpirate.local -c all
Spin up neo4j
Download BloudHound Lgacy and run it
Download and run BloodHound Ingestor bloodhound-python
Analyze the Actice Directory User Permissions and ACL(s)
f. RPC user enumeration#
rpcclient -U "dotpirate.local/dotpirate" <dc-ip> -c "enumdomusers"
(Enter Password)
Using Credentials through RPC to enumerate users
g. RPC User Description Enumeration#
rpcclient -U "dotpirate.local/dotpirate" <dc-ip> -c "querydispinfo"
(Enter Password)
Pulling User’s description through RPC
h. Pulling User Description via LDAP and netexec#
sudo netexec ldap <target-ip> -u 'dotpirate' -p 'l3tsh4ck!' -M get-desc-users
Get description of the users. My contained a password
** 2. Do I have any access? (Protocol Spray?)**#
a. netexec SMB Access#
sudo netexec smb 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!'
sudo netexec smb 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!' --local-auth
Check if our user can authenitcated into any host on the network via SMB
b. netexec WINRM Access#
sudo netexec winrm 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!'
Check if we can access any host in the network through WINRM
c. evil-winrm WINRM Access#
sudo evil-winrm -i 10.10.10.11 -u 'dotpirate' -p 'l3tsh4ck!'
Do not rely only on one tool
Use evil-winrm to check if we have acces through WINRM porotocol
d. netexec RDP Access#
sudo netexec rdp 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!'
sudo netexec rdp 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!' --local-auth
Check if we can access any host in the netrwork through RDP
f. netexec MSSQL Access#
sudo netexec mssql 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!'
sudo netexec rdp 10.10.10.0/24 -u 'dotpirate' -p 'l3tsh4ck!' --local-auth
Check if we can access any host in the netrwork through MSSQL
g. impacket MSSQL Access#
sudo impacket-mssqlclient -p 1433 dotpirate.local/dotpirate@<target-ip>
sudo impacket-mssqlclient -p 1433 PC1/dotpirate@<target-ip> -windows-auth
Check if we can access a specific host using a different tool through MSSQL
