This podcast is sponsored by Arctic Wolf, whose Concierge Security teams Monitor, Detect and Respond to Cyber threats 24/7 for thousands of customers around the world. Arctic Wolf. Redefining cybersecurity. Visit Arcticwolf.com/7MS to learn more.
Ok, ok, I know. I almost always say something like “Today is my favorite tale of pentest pwnage.” And guess what? Today is my favorite tale of pentest pwnage, and I don’t even know how it’s going to end yet, so stay tuned to next week’s (hopefully) exciting conclusion. For today, though, I’ve got some pentest tips to hopefully help you in your journeys of pwnage:
- PowerHuntShares is awesome at finding SMB shares and where you have read/write permissions on them. Note there is a
-Threads
flag to adjust the intensity of your scan. - Are your mitm6 attacks not working properly – even though they look like they should? There might be seem LDAP/LDAPs protections in play. Use LdapRelayScan to verify!
- Are you trying to abuse Active Directory Certificate Services attack ESC1 but things just don’t seem to be working? Make sure the cert you are forging is properly representing the user you are trying to spoof by using Get-LdapCurrentUser.ps1. Also look at PassTheCert as another tool to abuse ADCS vulnerabilities.
Example syntax for LdapCurrentUser:
Get-LdapCurrentUser -certificate my.pfx -server my.domain.controller:636 -usessl -CertificatePassword admin
- If you manage to get your hands on an old Active Directory backup, this PowerShell snippet will help you get a list of users from the current domain, sorted by
passwordlastset
. That way you can quickly find users who haven’t changed their password since the AD backup:
get-aduser -filter * -server victimdomain.local -properties pwdlastset,passwordlastset,enabled | where { $_.Enabled -eq $True} | select-object samaccountname,passwordlastset | sort-object passwordlastset
Share on socials: