Exfiltration
Don't mis any data
PoC
Linux
cat proof.txt && whoami && hostname && ip addrcat local.txt && whoami && hostname && ip addrWindows
type proof.txt && whoami && hostname && ipconfigtype local.txt && whoami && hostname && ipconfigCatch the Flag
Windows
dir "\proof*.txt" /s
PS> gci -recurse -inculde FILENAME*search credentials or password:
gci -path . -recurse -ea SilentlyContinue -Include *.txt,*.ini,*.yml,*.xml,*.ps1,*.cfg |select-string passLinux
Dump Active Directory with PS
Dump with dump.exe
make sure you able to access Lsass or you have managed the bypass LSA Protection to remove protection.
https://github.com/chvancooten/OSEP-Code-Snippets/tree/main/MiniDump
build it with configuration Release, x64, then run in the compromised user with NT AUTHORITY/SYSTEM priviledge.
the result is in the directory C:\Windows\Tasks\lsass.dmp

then use this command to exctract lsass.dmp via kali linux:
or via windows machine:
Dump with Mimikatz
ref: https://book.hacktricks.xyz/windows-hardening/stealing-credentials/credentials-mimikatz
cheatsheet: https://gist.github.com/insi2304/484a4e92941b437bad961fcacda82d49
copy from: https://kashz.gitbook.io/kashz-jewels/cheatsheet/mimikatz
Bypass LSA Protection
run this command:
Bypass AV and LSA
copy mimidrv.sys or mimikats.sys (driver) into the target computer
then create new service
[SC] CreateService SUCCESS
start new service
then you able to load mimikatz into memory with Invoke-Mimikatz
Disable LSA Protection
if success:
Now you able to interact with Lsass.
[Important to start first] Test Mimikatz
Password / hashes
Escalate privilege using NTLM Hash
ref: https://www.youtube.com/watch?v=NeY7OiQTRK8
DCsync (Priviledge Escalation AD)
[requirement] user must have permission to domain:
Replication Directory Changes
Replication Directory Changes All
[recommended to start] Elevate shell integrity
DCshadow
Attack DCshadow and DCsync (persistence domain admin / AD Attribute Takeover)
https://www.elladodelmal.com/2018/03/dcshadow-y-dcsync-enganando-al-domain.html
Use case:
Bypass MFA
Golden / Silver Ticket
Kerberos Skeleton key
Install backdoor to memory, and make all user can use same password "mimikatz".
note: if the machine was reboot, this backdoor can't exists.
Get DNS Zone
Online request server: https://beeceptor.com/
Last updated