Active Directory
Last updated
Was this helpful?
Last updated
Was this helpful?
Recon first using any port scanning tool.
Try to gather as much info possible. I usually start by brute forcing some users. But if we already know some creds, get to listing
Then, I check if any account is active with smbmap, smbclient, or crackmapexec. Using crackmapexec we can also bruteforce the RIDs.
You can then put all the (SidTypeUser) into a list and try to exploit Kerberos pre-authentication mechanisms and hopefully dump some hashes.
If any other user come out, that is just great, you can now maybe bruteforce a login if there is lockout or any other anti-bruteforce mechanism. You can also do this with crackmapexec