|
@@ -7,7 +7,9 @@ tags: [windows, security, network, AD]
|
|
|
Internal Network Audit
|
|
|
|
|
|
## Low Hanging Fruits
|
|
|
-
|
|
|
+{% hint style="info" %}
|
|
|
+Hello world
|
|
|
+{% endhint %}
|
|
|
### AD User Details
|
|
|
|
|
|
* Get domain password policy
|
|
@@ -50,11 +52,12 @@ kerbrute passwordspray -d <domain> users.txt Summer2019!
|
|
|
* Bloodhound Ingestors can be used to enumerate domain specific information from the DC
|
|
|
* Ingestors:
|
|
|
- PS (default ingestor)
|
|
|
- - python (`pip install blodohound`)
|
|
|
+ - python (`pip install bloodhound`)
|
|
|
- C# (Sharphound)
|
|
|
* can be executed from domain-joined and non-domain-joined computers.
|
|
|
|
|
|
* With the python ingestor
|
|
|
+
|
|
|
```
|
|
|
# Domain-joined host, working DNS
|
|
|
bloodhound-python -u user@DOMAIN -p PASSWORD
|