LDAP (389,636)
Windapsearch
python windapsearch.py -d example.local --dc-ip 10.10.10.182 -U --fullBloodhound
# Local Attack
.\SharpHound.exe -c All
# Remote Attack
bloodhound-python -c all -ns 172.0.0.1 -d INLANEFREIGHT.LOCAL -u administrator -p 'password123' --zip
nxc ldap 192.168.1.1 -u administrator -p 'password123' --bloodhound --collection All
# Attacker
neo4j start # neo4j:neo4j
bloodhound
MATCH (m:Computer) RETURN m
MATCH (m:User) RETURN m
MATCH p = (c:Computer)-[:HasSession]->(m:User) RETURN pLdap Shell
DNS Records
Targeted Kerberoasting (GenericAll)
Tehlikeli İzinler
Powerview
AD CS Zafiyetleri
Certify.exe: https://github.com/r3motecontrol/Ghostpack-CompiledBinaries/blob/master/Certify.exe
ESC8
Last updated