🔧Testing Active Directory
Tools
Load DSInternals using Powershell
Install Impacket in Linux
Install BloodHound in Linux
Install Kerbrute
Install Crackmapexec
Extract the AD hashes
Password spraying Active Directory
Kerberos brute-forcing attacks
Kerbrute
Username Enumeration
Password Attack
CrackMapExec to access and enumerate AD
Pass The Hash Attack
Investigate the SYSVOL share
Retrieve a File
Take advantage of legacy data
Jxplorer
Open Jxplorer
Enter username and password
Select a user
Select Table Editor Column at the right hand side
Decode the Info value (base64 encoded)
Decode Base64 value
Last updated