Hacking Notes
  • Hacking Notes
  • Penetration Testing Methodology
    • Host Discovery
    • Information Gathering
    • Exploit Research
    • Exploit Development
    • Exploit Testing
    • Exploiting
    • Information Gathering
    • Privilege Escalation
  • Shells
    • Reverse Shell Cheat Sheet
    • Bind Shell Cheat Sheet
    • Webshells
    • C Shell
  • Stuck?
  • LICENSE
  • Windows
    • Windows Information Gathering
    • Windows PrivEsc
      • Method
      • PE Scripts
      • Potatos
      • Windows Privs
    • Transferring Files
    • Active Directory
      • ad-attacks
      • auth-enumeration
      • unauth-enumeration
      • authentication-delegation
      • reference
      • Kerberos
        • Authentication Delegation
      • mind-map
    • LNK Files
    • SCF Files
    • Compile Code
    • Tips & Tricks
  • Linux
    • Linux OS Information Gathering
    • Linux PrivEsc
      • methodology
      • Privilege Escalation Scripts
        • LinEnum
    • Hosting Files
    • Linux File System
    • Scheduling Jobs
    • POSIX
      • Scripting
      • Notes
  • Web Application Testing
    • Methodology
    • Enumeration
    • Attacks
      • SQLi
      • File Inclusion
      • Directory Traversal
      • Cross-Site Scripting
      • Login Forms
      • Content Injection
      • XSS
    • Assessment Tools
      • ZAP
      • ffuf
      • Nikto
      • wpscan
      • zap
    • Wordpress
      • wpscan
    • Apache
    • Nostromo
  • Services
    • Services
      • Active Directory Administration
      • Cups
      • DFSR
      • DHCP Client
      • DHCP Server
      • DNS
      • FTP
      • HTTP
      • HTTP(S)
      • IIS
      • Imap Encrypted
      • IMAP
      • IPsec
        • Kerberos
        • LDAP
        • ldaps
        • MSRPC
        • MSSQL
        • MySQL
        • Netbios Datagram Service
        • Netbios Name Service
        • Netbios Session Service
        • NFS
        • NNTP
        • NTP
        • Oracle
        • POP3
        • POP3 Encrypted
        • RDP
      • Redis
        • RFSP
        • RPCbind / Portmapper
        • RSIP
        • RTSP
      • RSYNC
        • SMB
        • SMTP
        • SNMP
        • SSH
        • Telnet
        • TFTP
        • VNC
      • VNC Remote Desktop
      • VNC Web Interface
        • WinRM
      • Wins
  • Containers
    • Docker
  • Buffer Overflow
    • Buffer Overflow
    • win32
  • Tools
    • Windows
      • chisel
      • mimikatz
      • mssqlclient.py
      • plink
      • psexec.py
      • smbeagle
      • winexe
    • Linux
      • chisel
      • evil-winrm
      • exiftool
      • Impacket
        • GetADUsers
        • GetNPUsers
        • getST
        • getTGT
        • GetUserSPNS
        • secretsdump
        • smbclient
        • wmiexec
      • jd-gui
      • ldapsearch
      • strings
      • smbeagle
      • Helpful Sites
  • Misc
    • Tunneling
    • Cryptography
    • Regex
    • Tools to Checkout
  • Password Cracking
    • Hashcat
    • John The Ripper
  • Tunneling
    • Tunnels
  • Web3
    • Introduction
    • Audit Process
    • Report Writing
    • List of Tools
    • Web3 References
Powered by GitBook
On this page
  • Kerberosatble Users
  • DNS Enumeration

Was this helpful?

  1. Windows
  2. Active Directory

auth-enumeration

Much of the same enumeration is done after you get authentication, so go back and redo your enumeration just use the creds you now have. Once you completed that you can come back here and see what else you can do.

Kerberosatble Users

Kerberoasting is an attack technique that involves stealing the Kerberos Ticket-Granting Ticket (TGT) of a user and using it to request service tickets for other systems on the network. Impacket is a collection of Python scripts that can be used to perform Kerberoasting attack. Here's a general process for performing Kerberoasting using Impacket:

  1. Install Impacket: You will need to have Impacket installed on your system in order to use the Kerberoast script. You can install Impacket by running the following command:

Copy code

pip install impacket
  1. Get a list of user accounts: To perform Kerberoasting, you will need a list of user accounts in the target AD domain. You can use the Impacket GetUserSPNs.py script to enumerate the user accounts in the domain.

Copy code

GetUserSPNs.py -dc-ip <DC_IP> <domain>/<user>
  1. Request TGT for the user: Once you have a list of user accounts, you can use the Impacket GetUserSPNs.py script to request TGT for the user

Copy code

GetUserSPNs.py -request -dc-ip <DC_IP> <domain>/<user>
  1. Crack the hashes with hashcat

Copy code

hashcat -m 13100 -a 0 <path to hashes> <path to wordlist>

DNS Enumeration

adidnsdump -u '<FQDN>\<username>' -p '<password>' <NS server>

It might be useful to see tombstoned (deleted) records.

adidnsdump --include-tombstoned -u '<FQDN>\<username>' -p '<password>' <NS server>
Previousad-attacksNextunauth-enumeration

Last updated 2 years ago

Was this helpful?