Post-Compromise Enumeration
Last updated
Last updated
We compromised a user what can we do with it
How can we get Domain Admin
ldapsearch -x -h IP-ADRESS -b "dc=DOMAIN-NAME,dc=LOCAL"
will send back a lot of useful info including user enum. Very efficient when you can leverage anonymous bind
python3 ldapsearch-ad.py -l TARGET-IP -u firstname.lastname -p 'password' -d DOMAIN.LOCAL -t all
You will have very detailed infos on the domain and you can event output it in a file with -o filename
python3 ldapsearch-ad.py -l TARGET-IP -u firstname.lastname -p 'password' -d DOMAIN.LOCAL -t search -s '(&(objectCategory=person)(userAccountControl:1.2.840.113556.1.4.803:=262144))'
fin users with smartcard required for interactive logon
python3 ldapsearch-ad.py -l TARGET-IP -u firstname.lastname -p 'password' -d DOMAIN.LOCAL -t pass-pols
You will get the password policy
python3 ldapsearch-ad.py -l 10.129.42.188 -u firstname.lastname -p 'password' -d DOMAIN.LOCAL -t search -s '(&(objectCategory=person)(userAccountControl:1.2.840.113556.1.4.803:=128))'
user account has their userAccountControl value set to ENCRYPTED_TEXT_PWD_ALLOWED