Methodology
a simple walkthrough
Starting Point
Remember to bypass AMSI
Check for the Execution Policy Language
Check the commands you are allowed to execute
Use RunWithRegistryNonAdmin.bat
Use PowerUp and discover priv-esc vectors.
Unquoted Service
Modifiable Service File
Modifiable Service
DLL injection, etc
AFTER THAT, you get the local admin access, now start with the enumeration.
Also, add the current user to the localgroup administrators to maintain the local admin access.
Enumeration
Enumerate Users
Enumerate Computers
Enumerate Domain Administrators
Enumerate Enterprise Administrators
Enumerate all OUs
Enumerate all GPOs
Enumerate ACLs for Domain Admin Group
Enumerate interesting ACLs (important to take note of)
Enumerate all modify rights/permissions for the user you are using
Enumerate Trusts and Map em for the domain (internal and external)
Enumerate Forests and all domains in the forests
Enumerate interesting SPNs
Use BloodHound to analyse the Infrastructure
MOST IMPORTANT TAKE YOUR TIME DOING ENUMERATION, BECAUSE AFTER AN EFFECTIVE ENUMERATION THE EXPLOITATION IS JUST A WALK IN THE GARDEN.
Privilege Escalation
Identify a machine on which you have local admin access.
You can perform a local port scan as well to know about the services running and may find Jenkins, which may possess a potential attack vector. Or just go with the machine on which you are having the local admin access. (LOOK FOR DERVIATIVE LOCAL ADMIN ACCESS IN BLOODHOUND WHILE ENUMERATION, YOU CAN EXPLOIT THAT HERE AND GET A LEAD IN HACKING THE DOMAIN ADMIN'S ACCOUNT | make sure to check the AppLocker Registry key here for advantage over Language Constraint setup)
DOMAIN ADMIN PRIV-ESC
Hunt for Local Admin Users
Check The local Admin Access
If yes, Use Invoke-Command or Enter-PSSession
(In case of Language Constraint) Checking AppLockerPolicy and note the paths available for us
Disable Defender protections
Modify Invoke-Mimikatz.ps1 script to call the function in the script itself because we can't dot source files if in constrained language mode
Dump the hases
Get the ekeys
Get Credentials from the credential vault
After we get a DA user with Administrator access we can connect to the DC using Enter-PSSession
Forge inter-forest ticket by trust keys for forest Priv-Esc
Persistence
Golden Ticket
Silver Ticket
DSRM
ACL AdminSDHolder
ACL DCSync
ACL security Descriptors
Last updated