Enumerating users (No credentials)
Seeking for a foothold heh?
Kerbrute usernames
A tool to quickly bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication.
Getting users with impacket-lookupsid
Crackmapexec rid-brute
AS-REP Roasting
AS-REP roasting is an attack against Kerberos for user that don't require preauthentication During preauthentication, a user will enter their password which will be used to encrypt a timestamp and then the domain controller will attempt to decrypt it and validate that the right password was used and that it is not replaying a previous request. From there, the TGT will be issued for the user to use for future authentication. If preauthentication is disabled, an attacker could request authentication data for any user and the DC would return an encrypted TGT that can be brute-forced offline.
Guest access smb share
First list all shares:
Connect to share:
Enumerate LDAP
Relay/poisoning
AD-enumerator.py
Windows Active Directory enumeration tool for Linux, written in Python. Can be used to quickly enumerate popular services on a Windows Domain Controller.
Last updated