-> xfreerdp via RDP with sharing in \\tsclient\share\
-> rdesktop via RDP
-> evil-winrm
Cached Credential Storage and Retrieval
-> Dump the credentials of all connected users, including cached hashes
-> Mix
Extracting hashes
Intro
-> SAM - Security Account Manager (Store as user accounts) %SystemRoot%/system32/config/sam
-> NTDS.DIT (Windows Server / Active Directory - Store AD data including user accounts) %SystemRoot%/ntds/ntds.dit
-> SYSTEM (System file to decrypt SAM/NTDS.DIT) %SystemRoot%/system32/config/system
-> Backup - Sistemas antigos como XP/2003: C:\Windows\repair\sam and C:\Windows\repair\system
Get sam and system by registry (From old versions to recent versions)
-> transfer sam and syste via sharing files via SMB -> Configuring smb server 1
-> GetNPUsers.py - Query ASReproastable accounts from the KDC
Kerberoast
-> impacket-GetUserSPNs
or
or
Active Directory Lateral Movement
Pass the Hash
-> Allows an attacker to authenticate to a remote system or service via a user's NTLM hash
-> Remote Access - impacket-psexec
-> Remote Access + evil-winrm
Over Pass the Hash
-> Allows an attacker to abuse an NTLM user hash to obtain a full Kerberos ticket granting ticket (TGT) or service ticket, which grants us access to another machine or service as that user
-> Command execution with psexec
Silver Ticket - Pass the Ticket
-> It is a persistence and elevation of privilege technique in which a TGS is forged to gain access to a service in an application.
-> Get SID
or
-> Get Machine Account Hash
-> Exploitation mimikatz.exe
or
Golden Ticket - Pass the Ticket
-> It is a persistence and elevation of privilege technique where tickets are forged to take control of the Active Directory Key Distribution Service (KRBTGT) account and issue TGT's.
-> Get hash krbtgt
-> Get SID
or
-> Exploitation
DCSync Attack
-> The DCSync attack consists of requesting a replication update with a domain controller and obtaining the password hashes of each account in Active Directory without ever logging into the domain controller.
NetNTLM Authentication Exploits with SMB - LLMNR Poisoning - Capturing hash in responder
Responder allows you to perform Man-in-the-Middle attacks by poisoning responses during NetNTLM authentication, making the client talk to you instead of the real server it wants to connect to. On a real lan network, the responder will attempt to poison all Link-Local Multicast Name Resolution (LLMNR), NetBIOS Name Server (NBT-NS), and Web Proxy Auto-Dscovery (WPAD) requests detected. NBT-NS is the precursor protocol to LLMNR.