Active Directory
Discovering your domain
ipconfig /all
crackmapexec smb 10.10.10.0/24 # your subnet
Discovering the domain controller
nslookup <domain>
If logged into a domain-joined computer, run "echo %logonserver%"
If logged into a domain-joined computer, run nltest /dclist:yourdomain.com
crackmapexec smb 192.168.12.0/24 This also identifies server vulnerabilities (signing: False) means you can do an NLTM relay. (SMBv1:True) means you can do pass the hash
After completing a port scan, look for servers that have TCP port 389 (LDAP), 636 (LDAPS), 3268 (LDAP Global Catalog), or 3269 (LDAPS Global Catalog). Ports 3268 and 3269 are especially indicative of a domain controller, since only a DC can fulfill Global Catalog roles.
https://medium.com/@benichmt1/secretsdump-demystified-bfd0f933dd9b
https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
Checklist:
Run Responder to collect hashes traversing the network
Last updated