Attacking AD- Post-Compromise Enum

Taken from the PEH course from TCM Academy

Domain Enumeration with PowerView

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.

First of all we have to run this command:

powershell -ep bypass

-ep = Execution Policy

To run Powerview:

. \PowerView.ps1

Command examples

We can find more commands here:

Bloodhound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.

To start bloodhound we just have to run the following command:

neo4j console

SharpHound

. .\SharpHound.ps1

Invoke-BloodHound -CollectionMethod All -Domain dominio.local -ZipFileName file.zip

Bloodhound Examples

Uploading the zip generated by SharpHound

Last updated