AD Enumeration
Port scanning
nmap -A -p- -T3 --open -vvv -Pn <IP> -oN <output_file>
Important ports are 88, 445 and 139.
SMB Enumeration
smbclient //<IP>/interesting-directory -c 'recursive ; ls' - Fast smb directory enumeration
RPC Enumeration
rpcclient -U '' -N <IP> - Without password
rpcclient -U '' -P '' <IP> - Using a password
LDAP Enumeration
Using ldapsearch and ldapdomaindump
ldapsearch -H ldap://<IP> -x -s base namingcontext
ldapsearch -H ldap://<IP> -x -s -b 'DC=tld,DC=local' '(objectClass=User)' 'sAMAccountName' | grep sAMAccountname
Kerberos
kerbrute userenum --dc <domain.local> -d <domain> <path-to-user-wordlist>
Kerberoasting
Crackmapexec
crackmapexec smb targets.txt -u users.txt -p passwords.txt
crackmapexec smb targets.txt -u users.txt -p passwords.txt --continue-on-success
Evil-Winrm
evil-winrm -i <IP> -u 'user' -p 'password'
Last updated