Domain Network Enumeration
Enumerate the network and its services, find the DC,
Network Enumeration
nmap -sP -p $ip #ping scan
nmap -Pn -n -T4 -v3 $ip #quick scan
rustscan -a $ipDomain Name
nxc smb $network_ipDomain Controllers
They are usually DNS Servers. They have usually LDAP listening port 389.
# with nmap
nmap -p53,88,389 $network_ip --open -v -oN dc
# with nmcli
nmcli dev show $iface
# with nslookup
nslookup -type=SRV _ldap._tcp.dc.msdcs.$domainEnumerate alive machines
Enumerate services
DNS
Users Enumeration
Automatic tools
AD Enum
ASREPRoasting
Kerberoasting
Dump AD as BloodHound JSON files
Searching GPOs in SYSVOL for cpassword and decrypting
Run without creds and attempt to gather for further enumeration during the run
Sample exploits included:
CVE-2020-1472
Install
Last updated
Was this helpful?