🥳Authenticated
Steps for GreyBox penetration testing in Active Directory environments.
Basic Bloodhound
bloodhound-python -c All -d DOMAIN -u USER -p PASSWORD bloodhound-python -c All -d DOMAIN -u USER -p PASSWORD -ns DNS_IP --dns-tcpsudo neo4j startsudo apt-get install bloodhoundExtended Bloodhound
certipy find -u username@domain -p password -bloodhoundShares
Dumping credentials
Remotely
Using domain backup key
Locally
Impersonation
Kerberos Attacks
Kerberoast
ASP-REP Roasting
Constrained Delegation
RBCD
Silver Tickets
Errors
NTDS Exfiltration
Remotely
Locally
Cracking Passwords
Dumping credentials on a Samba DC

Last updated