๐ŸŒŒActive Directory Post Exploitation

Active Directory Post Exploitation

Access Users Remotely

Xfreerdp

xfreerdp /u:mike /p:P@ssword /d:homeserver.local /v:192.168.56.13 /w:1920 /h:1080 /fonts /smart-sizing

Gathering Info

Cmd

# Get current user's detail
whoami

# View Groups
whoami /groups

# View all users in the domain
net user

Privilege Escalation

Powershell

View Running Services

View Start Mode of Services

Check Permissions using ICACLS

C Program

Adduser.c

Compile

Share the Exe

Stealing Credentials

Mimikatz

Impacket

Wmiexec

PsExec

Forging Golden Tickets

Get krbtgt Hash and Domain SID

Create Golden Ticket

Using Golden Ticket

Powershell

PsExec


REFERENCES

  • https://www.mankier.com/1/xfreerdp

  • https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/icacls

  • https://en.wikipedia.org/wiki/Local_Security_Authority_Subsystem_Service

  • https://www.netwrix.com/how_golden_ticket_attack_works.html

  • https://docs.metasploit.com/docs/pentesting/active-directory/kerberos/forge_ticket.html

  • https://www.youtube.com/watch?v=f8jGhLwCa28&pp=ygUgd2luZG93cyBwZW50ZXN0IGFjdGl2ZSBkaXJlY3Rvcnk%3D

  • https://www.hackingarticles.in/understanding-guide-mimikatz/

  • https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/golden-ticket

Was this helpful?