PENTEST Sur AD
PENTEST Sur AD
com/amp/
Reconnaissance Commands:
+ c:\ > net user
By running this command in CMD (Command Prompt) you can easily see local users on your PC.
+ c:\ >whoami
This command can help you to see the current user associated with Active Directory logged in.
This command shows you all users from any group in the active directory.
also, you can see every user’s group by running this command :
To have a better look, you can user “AD Recon” script. AD Recon is a script written by “Sense of
Security“.
It uses about 12 thousand lines of PowerShell script that gives you a good look to AD and all info that
you will need it.
It is a method that provides you networks users to be secure from password-guessing attacks. Also,
you can see “Password Policy“. A password policy is a set of rules designed to enhance computer
security by encouraging users to employ strong passwords and use them properly.
When you get all the data that you need, now you can execute different attacks on users like :
The options of this auxiliary you can set username file and password file. and set an IP that has SMB
service open.
If you try false passwords more than Account Lockout Policy, you can see this message “Account
Has Been Locked out“.
If you try it on all accounts, all users will be disabled and you can see disorder in the network. As you
can see in Password Policy, you can set your password list to brute-force.
C:\Windows\NTDS
You will extract hashes from this file by using mimikatz. mimikatz has a feature which utilities the
Directory Replication Service (DRS) to retrieve the password hashes from NTDS.DIT file. you can run
it as you can see below :
mimikatz # lsadump::dcsync /domain:pentestlab.local /all /csv
Then you can see hashes and password (if the password can be found).
The active directory includes several services that run on Windows servers, it includes user groups,
applications, printers, and other resources.
It helps server administrators to manage devices connected with the network and it includes a
number of services such as Domain, Certificate Services, Lightweight Directory Services, Directory
Federation and rights management.
Active directory penetration testing is required for any organization, nowaday APT groups actively
targeting Active Directories using different techniques.