AD Attacks

Kerbero Brute-Force

# No creds, brute-force usernames over Kerberos (port 88)
kerbrute userenum --dc <dc_ip> -d <domain> usernames.txt

# Alternate method using Nmap
nmap -p 88 --script krb5-enum-users --script-args krb5-enum-users.realm='domain.local',userdb=users.txt <target_ip>

Why: Identify valid usernames when you don’t have any credentials.


ASREPRoasting

# Users with DONTREQPREAUTH can be roasted without creds
sudo impacket-GetUserSPNs -request -dc-ip 10.10.10.191 test.com/dhawan


# Crack the hashes
hashcat -m 18200 hash.txt wordlist.txt

Why: Exploit accounts with no pre-auth to extract crackable hashes.


Kerberoasting

Why: Request TGS tickets for SPNs and extract service account hashes.


Pass-the-Key (Overpass-the-Hash)

Why: Use NTLM hash to request TGT—login without knowing password.


Pass-the-Ticket

Why: Use harvested .kirbi ticket to impersonate users.


Silver Ticket

Using impacket

Injecting Silver ticket into Env

circle-info

-k Use Kerberos authentication. Grab credentials from ccache file (KRB5CCNAME) based on the target parameter

Why: Access services directly by forging a valid TGS (no contact with DC).


Golden Ticket

Why: Full domain compromise. Forge any TGT—unlimited access.


RBCD (Resource-based Constrained Delegation)

circle-exclamation

Why: Lateral to high-value target via impersonation through delegation abuse.


Misconfigured LAPS

Why: Extract cleartext local admin passwords if user has read access.


gMSA Password Extraction

refer tool -> https://github.com/micahvandeusen/gMSADumperarrow-up-right

Why: Extract machine-managed service account secrets used by services.

Last updated