Situational Active Directory Flashcards

(50 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tool to use to check for misconfigured service permissions?

A

AccessChk (Sysinternals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to perform Pass-the-Hash?

A

Mimikatz sekurlsa::pth or Impacket’s wmiexec.py with -hashes flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What tool to use for extracting hashes from memory?

A

Mimikatz sekurlsa::logonpasswords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What to check when you have SeImpersonatePrivilege?

A

JuicyPotato or RoguePotato for privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to enumerate Active Directory from a non-domain machine?

A

BloodHound (SharpHound)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to dump NTDS.dit from a domain controller?

A

vssadmin create shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What attack can be performed with unconstrained delegation?

A

Extract TGTs from memory using Mimikatz sekurlsa::tickets /export

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to exploit resource-based constrained delegation?

A

Create machine account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tool to use to exploit Kerberoasting?

A

Rubeus kerberoast or GetUserSPNs.ps1 from PowerView

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to find accounts vulnerable to Kerberoasting?

A

GetUserSPNs.py from Impacket or PowerView’s Get-DomainUser -SPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tool to use to perform AS-REP Roasting?

A

Rubeus asreproast or GetNPUsers.py from Impacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What permissions allow for DCSync attacks?

A

Replication rights (DS-Replication-Get-Changes & DS-Replication-Get-Changes-All)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool to use to perform a DCSync attack?

A

Mimikatz lsadump::dcsync /domain:example.com /user:krbtgt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to bypass AMSI in PowerShell?

A

Use AMSI bypass scripts (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to enumerate local privilege escalation opportunities?

A

WinPEAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What tool to use to check ACL misconfigurations?

A

BloodHound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tool to use to find unquoted service paths?

A

wmic service get name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How to execute arbitrary code via GPO abuse?

A

Modify a GPO that applies to a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What tool to use to exploit LAPS misconfiguration?

A

PowerView Get-DomainObject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How to exploit PrintNightmare vulnerability?

A

Invoke-Nightmare or Mimikatz via printer bug exploitation

22
Q

What attack can be performed when SeBackupPrivilege is enabled?

A

Copy SAM & SYSTEM files to extract hashes

23
Q

What attack to perform when you have SeRestorePrivilege?

A

Overwrite SAM with known administrator credentials

24
Q

What is the attack when SeTakeOwnershipPrivilege is enabled?

A

Take ownership of sensitive files (SAM

25
What is the attack when SeLoadDriverPrivilege is enabled?
Load a vulnerable driver to execute arbitrary code as SYSTEM
26
How to maintain persistence on a compromised AD?
Golden Ticket (forging TGTs)
27
What tool to use to create a Golden Ticket?
Mimikatz kerberos::golden /domain:example.com /sid:S-1-5-21-XXXX /krbtgt:HASH
28
How to escalate privileges with a writable service binary?
Replace service executable and restart service
29
What to check when you have a writable DLL in a service path?
Perform DLL hijacking by replacing the DLL with a malicious version
30
How to bypass UAC on Windows?
Use fodhelper
31
What tool to use to check for open SMB shares?
CrackMapExec
32
What tool to use to relay NTLM authentication?
Impacket’s ntlmrelayx.py
33
What attack can be performed with NTLM relay?
Relay authentication to LDAP
34
How to enumerate domain trusts?
nltest /domain_trusts
35
What is the attack when you find a writable Group Policy Preference (GPP)?
Extract credentials from cpassword in SYSVOL and decrypt with GpprefDecrypt.py
36
What attack can be performed with Shadow Credentials?
Forge certificates and authenticate as other users (PetitPotam abuse)
37
What tool to use to perform Shadow Credentials attack?
Certipy
38
What tool to use to find Kerberos ticket vulnerabilities?
Rubeus
39
How to perform a Silver Ticket attack?
Forge TGS with Mimikatz kerberos::golden and target specific services
40
What is the attack when you have constrained delegation enabled?
Perform S4U2Self + S4U2Proxy attack using Rubeus or Mimikatz
41
What tool to use to check for weak Kerberos encryption types?
Rubeus tgtdeleg /nowrap
42
How to escalate privileges using RBCD?
Add a new machine account and modify msDS-AllowedToActOnBehalfOfOtherIdentity
43
How to persist with AdminSDHolder abuse?
Modify ACLs on AdminSDHolder object to maintain admin access
44
How to check for vulnerable drivers for privilege escalation?
Use DriverQuery.exe
45
What tool to use to exploit insecure Active Directory permissions?
BloodHound (for mapping ACLs)
46
How to check for weak passwords in Active Directory?
CrackMapExec --pass-pol
47
What attack to perform if you find an unprotected LSASS process?
Dump LSASS memory using Mimikatz or Procdump.exe
48
How to check for domain controllers with missing security patches?
nmap --script smb-vuln-ms17-010
49
What is the attack when LDAP signing is disabled?
Intercept and modify LDAP traffic (LDAP relay attacks)
50
What tool to use to dump Active Directory data remotely?
ADExplorer.exe