cyber security
windows
active directory
pentest
nslookup
A good recon goal would be to conduct smb session enumeration against a domain controller to learn who has sessions with the SMB share and from what IP.
You can use JoeWare's NetSess tool for this from an admin lvl cmd prompt.
This ideally can harvest credentials from user memory
A harvested NTLM hash, like one we would get from the process above, can be used to obtain a TGT which allows us to masquerade as that user.
A new command prompt opens executing as the compromised user.
With the new command prompt obtained let's powershell
If we have the right set of credentials we can laterally move to the admin pc based on the info we have at this point
By this point, the attack should have given us validated admin privileges thus we are set to move laterally to admin pc and harvest more credentials.
We can finally become Luffy by passing the ticket
As the attacker we have successfully passed the ticket at this point.
We harvested Luffy's credential from AdminPc and then passed it to another process running on VictimPc.
However, these tickets remain unused.
Ensuring persistence on a domain to act as an insurance policy incase initial compromise and ensuing actions are discovered.
An example is using WMI (windows management instrumentation) to create a process locally on the DC that creates a new user and password.
Windows uses the Data protection API (DPAPI) to securely protect passwords saved by browsers, encrypted files, and other sensitive data
Domain controllers hold a master key that can decrypt all secrets on domain-joined windows machines.
We can use mimikatz to export the master key from the DC
With this key we can decrypt any DPAPI encrypted file or sensitive data from any machine in the entire forest.
The two common hacking tools for this are:
This patches the LSASS process on the domain controller.
At this point we can run whatever we want as whichever user we want using the skeleton key
Skeleton key can be used for any account including service accounts and computer accounts.