Cyber security

Pentesting Active Directory – A Comprehensive Guide To Tools, Techniques, And Commands

This is a cheatsheet of tools and commands that I use to pentest Active Directory. It includes Windows, Impacket and PowerView commands, how to use Bloodhound and popular exploits such as Zerologon and NO-PAC.

Enumeration

Initial System Enumeration

See local accounts

net user

See all of the accounts in the domain

net user /domain

Check if an account is a Domain Admin

net user <account-name> domain

See groups in the AD domain

net group /domain

Sync the clock with the DC (Domain Controller).

ntpdate <dc-ip>

Powerview

. .\PowerView.ps1

Information About The Domain

Get-NetDomain

Get-NetDomain-Controller

Get-Domain-Policy

See password rules

(Get-DomainPolicy).”system access”

Information about users Look for passwords/personal information in the description

Get-NetUser

Get-NetUser | select cn

Get-NetUser | select description

Get-NetUser | select samaccountname

Get-UserProperty -Properties pwdlastset

Get-UserProperty -Properties logoncount

Information About Computers

Get-NetComputer

Get-NetComputer -FullData

Get-NetGroup

Get-NetGroup -GroupName <group-name>

Get-NetGroup -GroupName “Domain Admins”

Get-NetGroupMember -GroupName “Domain Admins”

See SMB Shares

Invoke-ShareFinder

Crackmapexec

A few quick commands that I always use if I have no information about the machine

crackmapexec smb <ip>

crackmapexec smb <ip> -u ” -p ”

crackmapexec smb <ip> -u ‘guest’ -p ”

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security

garak checks if an LLM can be made to fail in a way we don't…

7 hours ago

Vermilion : Mastering Linux Post-Exploitation For Red Team Success

Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…

7 hours ago

AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration

ADCFFS is a PowerShell script that can be used to exploit the AD CS container…

7 hours ago

Usage Of Tartufo – A Comprehensive Guide To Securing Your Git Repositories

Tartufo will, by default, scan the entire history of a git repository for any text…

7 hours ago

Loco : A Rails-Inspired Framework For Rust Developers

Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…

1 day ago

Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files

A data hoarder’s dream come true: bundle any web page into a single HTML file.…

1 day ago