- Initial Foothold
- Scanning/Enumeration
- Pivoting & Tunneling
- Exploitation
- Privilege Escalation -> Escalate Privileges to Local Admin -> Escalate to Domain Admin
- Move onto standalone boxes
- My biggest question still remains, how does the initial foothold into the AD set work on the exam?
- Enumerate the entire box
- Escalate privileges to Local Admin
- Network Enumeration
- What do we need to pivot to?
- Multiple network interfaces?
- What tool do we need to do this?
- Attempt SSHuttle, plink.exe, and port forwarding
- Configure tool or technique to pivot to other boxes in the domain
- Port/service scan the new boxes
- Check the network shares
- Deploy ADPeas
- Go through slowly
- Hash? Crack with Hashcat
- Deploy WinPEAS
- AS-REP Roasting (User with Kerberos pre-authentication disabled) -- Username required no password
Cracking:
hashcat -m 18200 -a 0 <AS_REP_responses_file> <passwords_file>
- Kerberoasting (User with SPN) -- Requires username and password
Cracking:
hashcat -m 13100 --force <TGSs_file> <passwords_file>
Still stuck:
https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a