Active Directory Post Exploitation
Active Directory Post Exploitation
Access Users Remotely
Xfreerdp
Gathering Info
Cmd
Privilege Escalation
Powershell
View Running Services
View Start Mode of Services
Check Permissions using ICACLS
C Program
Adduser.c
Compile
Share the Exe
Stealing Credentials
Mimikatz
Impacket
Wmiexec
PsExec
Forging Golden Tickets
Get krbtgt Hash and Domain SID
Create Golden Ticket
Using Golden Ticket
Powershell
PsExec
REFERENCES
https://www.mankier.com/1/xfreerdp
https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/icacls
https://en.wikipedia.org/wiki/Local_Security_Authority_Subsystem_Service
https://www.netwrix.com/how_golden_ticket_attack_works.html
https://docs.metasploit.com/docs/pentesting/active-directory/kerberos/forge_ticket.html
https://www.youtube.com/watch?v=f8jGhLwCa28&pp=ygUgd2luZG93cyBwZW50ZXN0IGFjdGl2ZSBkaXJlY3Rvcnk%3D
https://www.hackingarticles.in/understanding-guide-mimikatz/
https://book.hacktricks.xyz/windows-hardening/active-directory-methodology/golden-ticket