Commands Only Summary
🪟 = Windows, 🐧 = Linux
Active Directory
🪟 SharpView (C# Port of PowerView)
AD Enumeration tool. C# port of 🪟 PowerView (Now deprecated). Same commands
Get help about a command
Enumerate information about a specific user
🪟 PowerView (Now deprecated)
AD Enumeration Tools
Import
Information for specific User or All users
Group specific info
Enumerate domain trust mappings
Test for local admin access on either the current machine or a remote one
Check Kerberoasting attack possibility
🪟 BloodHound
Collect data
🪟 [Built-in] ActiveDirectory PowerShell Module
AD Enumeration tools
Discover Modules
Load ActiveDirectory Module
Get Domain Info
List accounts that may be susceptible to a Kerberoasting attack
Verify domain trust relationships
Group Enumeration
Group Information
Group Membership Listing
If part of GMSA_MANAGERS Group, Set yourself as someone who can read the password
🪟 Snaffler
🐧 CrackMapExec (deprecated) | NetExec (updated)
A swiss army knife for pentesting networks
Help for specific protocol
Domain User Enumeration
Domain Group Enumeration
Logged On Users
Share Searching
Dig Through Share
Password Policy
Group Policy Password misconfiguration (GPP, usually to check if read access to SYSVOL)
Enumerate users from RID (for when the --users command doesnt work)
Get GMSA passwords
Get Group membership users
🐧 SMBMap
SMBMap is great for enumerating SMB shares from a Linux attack host. It can be used to gather a listing of shares, permissions, and share contents if accessible.
SMBMap To Check Access
Recursive List Of All Directories
🐧 rpcclient
Useful for enumeration with NULL sessions
Connect to anonymous session
Enumerate all users to gather the RIDs
User Enumeration By RID
🐧 Impacket Toolkit
Impacket is a versatile toolkit that provides us with many different ways to enumerate, interact, and exploit Windows protocols and find the information we need using Python.
Shell on target device (PSExec)
Stealthier Shell on target device (wmiexec.py)
A more stealthy approach to execution on hosts than other tools, but would still likely be caught by most modern anti-virus and EDR systems.
Finding ASREProasting targets
No user specification needed
Edit DACL to get DCSync
target-dn is the LDAP format, like DC=htb,DC=local
DCSync attack, secretsdump
🐧 Windapsearch
Enumerate Domain Admins
Enumerate Priviledged Users
🐧 Bloodhound.py
Collect data for BloodHound GUI from a Linux host
NTLM Hash instead of password
(the NTLM hash needs to be preceded by the :
). Use -c all
or -c dconly
🐧 ldapsearch
-h <host>
-x
simple authentication (anonymous)-s
scope (-s base namingcontexts
). Output of this goes in the-b
flag content-b
base (-b "DC=htb,DC=local"
) (Basically the searching scope)
Get naming context (domain name)
Get anonymous info
Query for users (Object class of Person)
Usually the class can be person, organizationalPerson or user
Query for users and only show username
(you can add more things at the end, such as sAMAccountName userPrincipalName
)
🐧 🪟 Hashcat
secretsdump output
Find Hashcat mode
Generate password list from rules
Limit length of passwords
Hashes in user:hash format to save user info
Put the hashes in a file in the user:hash
format, for example for NTLM hashes then use the flag --user
for automatically make hashcat discard that first column and use the rest as the hash. This allows to use --show
to then recover the user of the cracked password from the potfile.
🐧 BloodyAD
Swiss army knife for AD privilege escalation
As other tools, to use NTLM hashes on this put them in the -p password field PRECEDED by a :
Set yourself as owner
Add user to group (GenericAll over group)
Add DCSync rights to user
🐧 ntpdate
Useful to adjust the system clock to one of another machine. Solves problem like kerberos Clock skew too great
🪟 Mounting smb share (auth) from command line
list with
Last updated