Misc
Enum4linux
Pull a lot of information out of the Domain Controller using enum4linux
enum4linux 10.10.10.161Password Policy enumeration
crackmapexec smb 10.10.10.161 -u '' -p '' --pass-pol
RPCClient
GetNPUsers
Queries target domain for users with 'Do not require Kerberos preauthentication' set and export their TGTs for cracking

Credentials inside SYSVOL
Credentials may be stored inside of a script in the SYSVOL of the domain controller. Can happen on old AD environments.
Anyone with domain credentials can access the SYSVOL. To assign default local admin credentials LAPS is now used instead of scripts via Group Policy
Example path: \\conda.local\SYSVOL\conda.local\Policies{EA3B53C1-DDB1-4E62-818F-B7E7933A4E44}\Machine\Scripts\Startup\Set-Password.ps1
SMB and RPC Null Authentication
Notes
Last updated
Was this helpful?