Basic Enumeration Methodology
This will be fully automatized with the new ADpwn release ;)
ldapdomaindump
Bloodhound Dump
bloodhound-python -u <USER> -d <DOMAIN> -p <PASSWORD> -c all -ns <DC_IP> --zip
(fancy and new ->) nxc ldap <IP> -u <USER> -p <PASSWORD> --bloodhound --collection All
export KRB5CCNAME=<TICKET> rusthound-ce -u <USER> -p <PASSWORD> --domain <DOMAIN> -c <COLLECTION_M> -k -f <DC_FQDN> --zip
Last updated
Was this helpful?