Active Directory
Last updated
Last updated
Discovering your domain
ipconfig /all
crackmapexec smb 10.10.10.0/24 # your subnet
Discovering the domain controller
nslookup <domain>
If logged into a domain-joined computer, run "echo %logonserver%"
If logged into a domain-joined computer, run nltest /dclist:yourdomain.com
crackmapexec smb 192.168.12.0/24 This also identifies server vulnerabilities (signing: False) means you can do an NLTM relay. (SMBv1:True) means you can do pass the hash
After completing a port scan, look for servers that have TCP port 389 (LDAP), 636 (LDAPS), 3268 (LDAP Global Catalog), or 3269 (LDAPS Global Catalog). Ports 3268 and 3269 are especially indicative of a domain controller, since only a DC can fulfill Global Catalog roles.
Checklist:
Run Responder to collect hashes traversing the network