Commands Only Summary
🪟 = Windows, 🐧 = Linux
Active Directory
🪟 SharpView (C# Port of PowerView)
AD Enumeration tool. C# port of 🪟 PowerView (Now deprecated). Same commands
Get help about a command
Enumerate information about a specific user
🪟 PowerView (Now deprecated)
AD Enumeration Tools
Import
Information for specific User or All users
Group specific info
Enumerate domain trust mappings
Test for local admin access on either the current machine or a remote one
Check Kerberoasting attack possibility
🪟 BloodHound
Collect data
🪟 [Built-in] ActiveDirectory PowerShell Module
AD Enumeration tools
Discover Modules
Load ActiveDirectory Module
Get Domain Info
List accounts that may be susceptible to a Kerberoasting attack
Verify domain trust relationships
Group Enumeration
Group Information
Group Membership Listing
🪟 Snaffler
Snaffler is a tool that can help us acquire credentials or other sensitive data in an Active Directory environment. Snaffler works by obtaining a list of hosts within the domain and then enumerating those hosts for shares and readable directories. Once that is done, it iterates through any directories readable by our user and hunts for files that could serve to better our position within the assessment. Snaffler requires that it be run from a domain-joined host or in a domain-user context.
🐧 CrackMapExec (deprecated) | NetExec (updated)
A swiss army knife for pentesting networks
Help for specific protocol
Domain User Enumeration
Domain Group Enumeration
Logged On Users
Share Searching
Dig Through Share
When completed, CME writes the results to a JSON file located at /tmp/cme_spider_plus/<ip of host>
🐧 SMBMap
SMBMap is great for enumerating SMB shares from a Linux attack host. It can be used to gather a listing of shares, permissions, and share contents if accessible.
SMBMap To Check Access
Recursive List Of All Directories
🐧 rpcclient
Useful for enumeration with NULL sessions
Enumerate all users to gather the RIDs
User Enumeration By RID
🐧 Impacket Toolkit
Impacket is a versatile toolkit that provides us with many different ways to enumerate, interact, and exploit Windows protocols and find the information we need using Python.
Shell on target device (PSExec)
Stealthier Shell on target device (wmiexec.py)
A more stealthy approach to execution on hosts than other tools, but would still likely be caught by most modern anti-virus and EDR systems.
🐧 Windapsearch
Windapsearch is another handy Python script we can use to enumerate users, groups, and computers from a Windows domain by utilizing LDAP queries.
Enumerate Domain Admins
Enumerate Priviledged Users
🐧 Bloodhound.py
Collect data for BloodHound GUI from a Linux host
🐧 🪟 Hashcat
Last updated