Active Directory Pentesting
Enumeration
Domain Controllers Discovery
dig @<target-ip> example.local ANY
gobuster dns -d example.local -w subdomains.txt -t 25Enumeration with BloodHound
1. Run BloodHound
curl -L https://ghst.ly/getbhce > docker-compose.yml
sudo docker-compose down -v # If you want to reset the password of BloodHound...
sudo docker-compose pull && sudo docker-compose upexport BLOODHOUND_HOST=10.0.0.1
export BLOODHOUND_PORT=80902. Collect Data
3. Upload Collected Data
Investigation
Abuse Logon Script for Other Users
Force Change Password Attack
Microsoft Management Console (mmc)
Naming Convention
SSH Login with AD Credentials
Inject Credentials into Memory
DNS Configuration
Basic Knowledge
User Management
Intercept NetNTLM Authentication
References
Last updated