Commands Only Summary
πͺ = Windows, π§ = Linux
π§ Find
Find all SUID binaries
find / -perm -u=s -type f 2>/dev/nullAll readable files
find / -type f -readable ! -path "/proc/*" ! -path "/dev/*" ! -path "/run/*" ! -path "/sys/*" 2>/dev/nullAll files from user
find / -user 'USERNAME' ! -path "/proc/*" ! -path "/dev/*" ! -path "/run/*" ! -path "/sys/*" 2>/dev/nullActive Directory
πͺ SharpView (C# Port of PowerView)
Get help about a command
.\SharpView.exe Get-DomainUser -HelpEnumerate information about a specific user
πͺ PowerView (Now deprecated)
Import
Information for specific User or All users
Group specific info
Enumerate domain trust mappings
Test for local admin access on either the current machine or a remote one
Check Kerberoasting attack possibility
πͺ BloodHound
Collect data
πͺ [Built-in] ActiveDirectory PowerShell Module
Discover Modules
Load ActiveDirectory Module
Get Domain Info
List accounts that may be susceptible to a Kerberoasting attack
Verify domain trust relationships
Group Enumeration
Group Information
Group Membership Listing
If part of GMSA_MANAGERS Group, Set yourself as someone who can read the password
πͺ Snaffler
π§ CrackMapExec (deprecated) | NetExec (updated)
Help for specific protocol
Domain User Enumeration
Domain Group Enumeration
Logged On Users
Share Searching
Dig Through Share
Password Policy
Group Policy Password misconfiguration (GPP, usually to check if read access to SYSVOL)
Enumerate users from RID (for when the --users command doesnt work)
Get GMSA passwords
Get Group membership users
Find certificate server (ADCS)
List Kerberoastable users
π§ SMBMap
SMBMap To Check Access
Recursive List Of All Directories
π§ rpcclient
Connect to anonymous session
Enumerate all users to gather the RIDs
User Enumeration By RID
π§ Impacket Toolkit
Shell on target device (PSExec)
Stealthier Shell on target device (wmiexec.py)
Finding ASREProasting targets
Edit DACL to get DCSync
DCSync attack, secretsdump
π§ Windapsearch
Enumerate Domain Admins
Enumerate Priviledged Users
π§ Bloodhound.py
NTLM Hash instead of password
π§ ldapsearch
Get naming context (domain name)
Get anonymous info
Query for users (Object class of Person)
Query for users and only show username
π§ Evil-winrm
Connect with kerberos
π§ πͺ Hashcat
secretsdump output
Find Hashcat mode
Generate password list from rules
Limit length of passwords
Hashes in user:hash format to save user info
π§ BloodyAD
Set yourself as owner
Get Writable
Add user to group (GenericAll over group)
Add DCSync rights to user
Read GMSA password
Disable Pre Authentication
Enable account
π§ ntpdate
π§ Sanitize/Stabilize Reverse Shell
π§ Process monitoring without permissions
π§ pwning `su` command usage
πͺ Mounting smb share (auth) from command line
πͺ Refreshing Privileges after privesc without closing and reopening
Last updated