Monstersec Blog
LinkedinTwitter
  • Monstersec Blog
  • Adversary Experience
    • Undetectable Phishing setup
    • How to Root any Android phone In A Just Few Hours
    • Red Team Plot
      • Red Team Simulation
      • AD Enumeration
        • Powerview
      • Initial Access
      • Defense Evasion
      • Local Privilege Escalation
      • Credential Access
      • Lateral Movement
      • Local Persistence
      • Domain Privilege Escalation
      • Domain Persistence
      • Beyond Domain Admin
      • AD Certificate Service Attacks
      • Red Team Reference
    • Detection - Blue Team
    • Ransomware Plot
      • Ransomware TTPs
      • Ransomware Analysis
    • Pentesting Plot
      • Mobile Pentesting
      • Network Pentesting
      • API Pentesting
      • Web Pentesting
    • OSINT Plot
    • Cloud Security Plot
      • Azure
      • AWS
      • GCP
    • Attack Surface Management Plot
      • Asset Inventory
      • Asset Analysis
      • Vulnerability Finding
      • Risk Prioritization
    • DDoS Simulation
      • Layer 3
      • Layer 4
      • Layer 7
      • DDOS Bot
    • Automation
    • Cyber Security - Interview Questions
      • Basic Computer Science
      • Offensive Security
        • Pentesting
          • Network
          • Mobile
          • web
        • Red Teaming
        • Cloud Security
Powered by GitBook
On this page

Was this helpful?

  1. Adversary Experience
  2. Red Team Plot

AD Enumeration

Enumeration:

Remote AD Enumeration - https://github.com/UserExistsError/adenum.py

Enumeration via COM objects - https://www.mandiant.com/resources/blog/hunting-com-objects

[ File transfer ]

Portable Python - https://sourceforge.net/projects/portable-python/ [ can install with admin privilege ]

IP address and their subnet mask:

type ipconfig /all

get the mask details and find the mask value by using below image.

Stealing NTLM Hash : smb signing and not required based vulnerability https://infosecwriteups.com/abusing-ntlm-relay-and-pass-the-hash-for-admin-d24d0f12bea0

ADRecon Tools:

-- https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/bloodhound

Bloodhound custom queries

  • https://github.com/ZephrFish/Bloodhound-CustomQueries

  • https://github.com/CompassSecurity/BloodHoundQueries

Cheatsheet https://wadcoms.github.io/ https://gtfobins.github.io/ https://lolbas-project.github.io/#

Responder - https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html

Hashes and tickets - https://dmcxblue.net/2021/07/18/playing-with-hashes-and-tickets/

smbexec - https://dmcxblue.net/2021/02/20/a-dive-on-smbexec/

fileless malware - https://dmcxblue.net/2021/08/30/fileless-malware/

ACL Abuse

- https://www.youtube.com/watch?v=z8thoG7gPd0

PreviousRed Team SimulationNextPowerview

Last updated 2 years ago

Was this helpful?