Situational Active Directory Flashcards
(50 cards)
What tool to use to check for misconfigured service permissions?
AccessChk (Sysinternals)
How to perform Pass-the-Hash?
Mimikatz sekurlsa::pth or Impacket’s wmiexec.py with -hashes flag
What tool to use for extracting hashes from memory?
Mimikatz sekurlsa::logonpasswords
What to check when you have SeImpersonatePrivilege?
JuicyPotato or RoguePotato for privilege escalation
How to enumerate Active Directory from a non-domain machine?
BloodHound (SharpHound)
How to dump NTDS.dit from a domain controller?
vssadmin create shadow
What attack can be performed with unconstrained delegation?
Extract TGTs from memory using Mimikatz sekurlsa::tickets /export
How to exploit resource-based constrained delegation?
Create machine account
What tool to use to exploit Kerberoasting?
Rubeus kerberoast or GetUserSPNs.ps1 from PowerView
How to find accounts vulnerable to Kerberoasting?
GetUserSPNs.py from Impacket or PowerView’s Get-DomainUser -SPN
What tool to use to perform AS-REP Roasting?
Rubeus asreproast or GetNPUsers.py from Impacket
What permissions allow for DCSync attacks?
Replication rights (DS-Replication-Get-Changes & DS-Replication-Get-Changes-All)
What tool to use to perform a DCSync attack?
Mimikatz lsadump::dcsync /domain:example.com /user:krbtgt
How to bypass AMSI in PowerShell?
Use AMSI bypass scripts (e.g.
How to enumerate local privilege escalation opportunities?
WinPEAS
What tool to use to check ACL misconfigurations?
BloodHound
What tool to use to find unquoted service paths?
wmic service get name
How to execute arbitrary code via GPO abuse?
Modify a GPO that applies to a target
What tool to use to exploit LAPS misconfiguration?
PowerView Get-DomainObject
How to exploit PrintNightmare vulnerability?
Invoke-Nightmare or Mimikatz via printer bug exploitation
What attack can be performed when SeBackupPrivilege is enabled?
Copy SAM & SYSTEM files to extract hashes
What attack to perform when you have SeRestorePrivilege?
Overwrite SAM with known administrator credentials
What is the attack when SeTakeOwnershipPrivilege is enabled?
Take ownership of sensitive files (SAM