Domain Network Enumeration

Enumerate the network and its services, find the DC,

Network Enumeration

nmap -sP -p $ip #ping scan
nmap -Pn -n -T4 -v3 $ip #quick scan
rustscan -a $ip

Domain Name

nxc smb $network_ip

Domain Controllers

They are usually DNS Servers. They have usually LDAP listening port 389.

# with nmap
nmap -p53,88,389 $network_ip --open -v -oN dc
# with nmcli
nmcli dev show $iface
# with nslookup
nslookup -type=SRV _ldap._tcp.dc.msdcs.$domain

Enumerate alive machines

Enumerate services

DNS

Users Enumeration

Automatic tools

AD Enum

  • ASREPRoasting

  • Kerberoasting

  • Dump AD as BloodHound JSON files

  • Searching GPOs in SYSVOL for cpassword and decrypting

  • Run without creds and attempt to gather for further enumeration during the run

  • Sample exploits included:

    • CVE-2020-1472

Install

Last updated

Was this helpful?