oscp+
oscp+
oscp+
Connect to the network where the AD machines are hosted. This may be
provided via a VPN or directly if it’s a local lab setup.
You have been given a username and password. Use it to try logging in
via:
hostname
ipconfig /all
This will provide information about network configuration and potential subnet
ranges to scan later.
oscp+ 1
net user
Enumerate local users to understand available accounts and check for any
inactive/legacy accounts that may have weak passwords.
Shared Directories:
Check for accessible network shares that may contain sensitive information or
further login credentials.
If you find a vulnerable service that allows file modifications in its path,
replace its executable with your own payload to gain higher privileges.
C:\\Program Files .
dir /s /b C:\\Users\\Public\\*.config
oscp+ 2
reg save HKLM\\SAM sam.save
reg save HKLM\\SYSTEM system.save
Use secretsdump.py (from Impacket ) on the extracted SAM and SYSTEM files to
obtain password hashes.
Credential Reuse:
If you have plaintext credentials, log into Machine #2 using the same
RDP/WinRM methods as for Machine #1.
oscp+ 3
Get-NetGroupMember -GroupName "Domain Admins"
Upload the data to BloodHound and examine the graph for possible privilege
escalation paths, especially for “Shortest Path to Domain Admins.”
oscp+ 4
Step 1: Targeted AD Attacks on Domain Controller
Extract Credentials:
This attack will allow you to generate valid Kerberos tickets and impersonate
any user indefinitely.
mimikatz # sekurlsa::logonPasswords
oscp+ 5
Post-Exploitation and Flag Collection
1. Flag Locations:
If allowed, create a new domain user and add them to privileged groups:
2. Document Everything:
Log all commands, paths, flags, and credentials obtained for accurate
reporting.
This comprehensive guide, with specific commands and explanations, should help
you navigate each machine effectively and capture maximum points on the AD
set. Good luck!
oscp+ 6