Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCO AD Range #287

Open
marissaeinhorn opened this issue Jul 25, 2022 · 0 comments
Open

OCO AD Range #287

marissaeinhorn opened this issue Jul 25, 2022 · 0 comments
Assignees

Comments

@marissaeinhorn
Copy link
Collaborator

Attack chain

  1. Catch Callback from pre-seeded implant from .45
  • Requires listener set up properly (either in sliver/other post-ex
    platform/MSF depending on range availability)
  • Requires redirector set up properly
  1. Survey Accesses after gaining access
  • Will have user-level access
  • Need to priv-esc to get system (PowerSploit)
  • Workstation Admin is logged into the system
  1. Gain Workstation Admin Credentials
  • Use migrate or steal the token for the Workstation Admin that you see
    logged in when surveying
  1. Active Directory Enumeration
  • BloodHound
  • PowerView
  • net commands (e.g. net <computers/users/groups> /domain)
  • Get-AD* commands
  1. ID Domain Admin logged into the .10 (probably from BloodHound sessions
    report)

  2. ID Basic Facts about the domain itself

  • Users / Groups / Computers
  • Domain Admins
  • Workstation Admins
  • Enterprise Admins
  • etc.
  1. Laterally move to the .100 to obtain DA credentials

  2. Elevate to system and migrate or steal token of Domain Admin logged in

  3. Laterally move to the Domain Controller (DC)

  4. Collect/crack hashes for the domain

  • Can do w/ mimikatz/kiwi
  • Steal ntds.dit
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants