Initial Access

Initial Access

Password Spraying Attack - https://github.com/praetorian-inc/tridentarrow-up-right

An Office365 User Attack Tool - https://github.com/optiv/Go365arrow-up-right

Social Engineering Attack:

Phishing Toolkit

Phishing Techniques:

Normal phishing - Without targeting anyone, a group, we send a trap email to target.

Spear Phishing

Smishing

Vishing

Tips & unusual procedure:

LLMNR to Domain Admin

Kerberoasting

Kerberoasting is an attack that abuses the Kerberos protocol to harvest password hashes for Active Directory user accounts with servicePrincipalName (SPN) values — i.e., service accounts.

A user is allowed to request a ticket-granting service (TGS) ticket for any SPN, and parts of the TGS may be encrypted with RC4 using the password hash of the service account that is assigned the requested SPN as the key. Therefore, an adversary who is able to steal TGS tickets (either from memory or by capturing them by sniffing network traffic) can extract the service account’s password hash and attempt an offline brute force attack to obtain the plaintext password.

Theory Explanation - https://www.crowdstrike.com/cybersecurity-101/kerberoasting/arrow-up-right

-- https://www.hackingarticles.in/deep-dive-into-kerberoasting-attack/arrow-up-right

Attack Tutorial - https://r3dbuck3t.notion.site/Kerberoasting-Service-Accounts-7a8de9de43aa43fb9f9c7b97bf98227farrow-up-right

-- https://www.netwrix.com/cracking_kerberos_tgs_tickets_using_kerberoasting.htmlarrow-up-right

password cracking:

https://hackingvision.com/2020/03/27/hashcat-rule-based-attack/arrow-up-right - hashcat rule add with rockyoutxt file.

Responder

inveigh:

Latest tutorial : https://www.netspi.com/blog/technical/network-penetration-testing/inveigh-whats-new-in-version-1-4/arrow-up-right

https://www.a2secure.com/en/blog/how-to-use-responder-to-capture-netntlm-and-grab-a-shell/arrow-up-right

Last updated