Active Directory Enumeration
Privileged Groups
AD Recycle Bin
A user in the group is allowed to read / recover deleted AD objects.
Get-ADObject -filter 'isDeleted -eq $true' -includeDeletedObjects -Properties *Remote Management Users
Members of this group can access PCs over WinRM
Get-NetGroupMember -Identity "Remote Management Users" -Recurse
Get-NetLocalGroupMember -ComputerName <pc_name> -GroupName "Remote Management Users"AD Backup Operators
Members of the Backup Operators group can back up and restore all files on a computer, regardless of the permissions that protect those files
# Import libraries
Import-Module .\SeBackupPrivilegeUtils.dll
Import-Module .\SeBackupPrivilegeCmdLets.dll
# Enable SeBackupPrivilege
Set-SeBackupPrivilege
Get-SeBackupPrivilegeGet Hashes from .dit File
gMSA
(ReadGMSAPassword abuse) Group Managed Service Accounts (gMSA) are where Windows servers manage the password for an account by generating a long random password for it.
Get Password (locally)
This solution is taken from: https://0xdf.gitlab.io/2022/04/30/htb-search.html#get-password
impacket-ntlmrelayx
GMSAPasswordReader
Interesting Account Names
AD Support Accounts
Often we have the credentials belonging to limited administrative accounts such as IT, helpdesk or support.
Sometimes, these accounts have an ability to reset passwords.
Note that the wording of the account name might be different, but related to aforementioned names
BloodHound
BloodHound is used to visualise AD environments and discover attack paths.
Ingestors
SharpHound
Local data collector for BloodHound
bloodhound.py
Python based data collection tool for BloodHound This will run against the domain, so can one run it from a remote machine.
Powerview
Enumeration
Last updated