• Ports: ldap 389/tcp ldaps 636/tcp globalldap/globalcatldap 3268/tcp globalldaps/globalcatldapssl 3269/tcp Enumerate without credentials Nmap enu­mer­a­tion scans nmap -n -sV --script "ldap* and not brute" $target Ldapsearch scan ldapsearch -x -h $target -D '' -w '' -b "DC=BLA,DC=local" Con­nect to LDAPs/GlobalLDAPs: openssl s_client -connect $target:636 </dev/null openssl s_client -connect $target:3269 </dev/null Search in the directory: ldapsearch -x -b…

  • PowerShell

    Pow­er­shell Cmdlets con­sist out of Verb-Method. To search for a method, type Get-Command New-U* To see all attrib­ut­es for a Cmdlet, type Get-LocalUser | Get-Member To see spe­cif­ic or non-default attrib­ut­es, type Get-LocalUser | Select-Object -Property Name,PasswordRequired Examples Directories and files Get all files in the cur­rent directory. Get-ChildItem Get all files in the cur­rent direc­to­ry and below.…

  • Win­dows Remote Man­age­ment (Win­RM / wsman) is a ser­vice which runs on port 5985 and 5986. Evil Winrm Github | Opens a shell for a user root@kali:~# evil-winrm -i $victim -u melanie -p 'Welcome123!' For many users: for cred in $(cat user_pass.txt); do username=$(echo $cred | cut -d ',' -f 1) password=$(echo $cred | cut -d ',' -f…

  • Kerberos

    Basics Authen­ti­ca­tion sequence for an user to log in on a domain (con­troller): Authen­ti­ca­tion sequence for an authen­ti­cat­ed user on a local system: Terminology Ker­beroast­ing means an offline crack­ing of the pass­word in the NTLM hash. Use­less if the ser­vice runs as ser­vice user. Then, the pass­word will be replaced by a 128 char­ac­ter long…

  • redline

    Like OSX­col­lec­tor, but for Win­dows. Col­lects infor­ma­tion on a host for lat­er analyzation. https://www.fireeye.com/services/freeware/redline.html