LDAP (389,636)

Windapsearch

python windapsearch.py -d example.local --dc-ip 10.10.10.182 -U --full

Bloodhound

# Local Attack
.\SharpHound.exe -c All

# Remote Attack
bloodhound-python -c all -ns 172.0.0.1 -d INLANEFREIGHT.LOCAL -u administrator -p 'password123' --zip
nxc ldap 192.168.1.1 -u administrator -p 'password123' --bloodhound --collection All

# Attacker
neo4j start # neo4j:neo4j
bloodhound

MATCH (m:Computer) RETURN m 
MATCH (m:User) RETURN m
MATCH p = (c:Computer)-[:HasSession]->(m:User) RETURN p

Ldap Shell

DNS Records

Targeted Kerberoasting (GenericAll)

Tehlikeli İzinler

Powerview

AD CS Zafiyetleri

Certify.exe: https://github.com/r3motecontrol/Ghostpack-CompiledBinaries/blob/master/Certify.exe

ESC8

Last updated