Casual McDonald's Employee Scriptorium
BlogMemesGitHubAbout
  • root@JesusCries
  • ⛩️Red Teaming
    • Methodology
    • Red Team Infrastructure
    • Initial Access
    • Reconnaissance
    • Lateral Movement
    • Post-Exploitation
      • Credentials Dumping
    • Persistence
    • Evasion
      • Memory Scanner
      • Antimalware Scan Interface (AMSI)
      • Event Tracing for Windows (ETW)
      • Attack Surface Reduction (ASR)
      • Microsoft Windows Defender Application Control (WDAC)
      • EDR Evasion
    • Offensive Development
      • Process Injection & Shellcode Loader
      • Portable Executable (PE) Loader
      • User Defined Reflective Loader
      • Beacon Object Files
    • Command & Control (C2)
      • Cobalt Strike
      • Havoc
      • Mythic
      • Sliver
    • Miscellaneous
      • Interesting Read
      • Certification Reviews
        • Certified Red Team Lead (CRTL)
  • 🧊Active Directory & Pentest
    • Check List
  • 🚩CTF Writeups
    • Reverse Engineering
      • Wargames.MY 2024: World 3
      • Wargames.MY 2023: Defeat the boss!
      • ACS 2023: Licrackense Pt I
      • ACS 2023: babyrev
      • ACS 2023: expr
      • ACS 2023: rustarm
      • ACS 2023: Maze
      • SiberSiaga 2023: Obstacles
      • SiberSiaga 2023: Packed
      • SiberSiaga 2023: Malbot
      • SiberSiaga 2023: Vacine
      • ABOH 2023: MetalPipe
      • ABOH 2023: Grape
      • iCTF 2023: RemoteC4
    • Binary Exploitation
      • HTB Cyber Apocalypse 2024: SoundOfSilence
      • LACTF 2024: pizza
      • ACS 2023: Licrackense Pt II
      • ACS 2023: Shellcoding Test
      • ACS 2023: Coding Test
      • ACS 2023: register
      • Wargames.MY 2023: Pak Mat Burger
      • SiberSiaga 2023: Password Generator
      • NahamCON CTF 2023: nahmnahmnahm
      • NahamCON CTF 2023: Weird Cookie
      • TJCTF 2023: shelly
      • TJCTF 2023: formatter
      • ångstromCTF 2023: gaga2
      • ångstromCTF 2023: leek
      • Space Heroes 2023: Rope Dancer
      • corCTF 2022: babypwn
      • corCTF 2021: Cshell
      • HTB Cyber Apocalypse 2023: Void
      • HTB Cyber Santa CTF 2021: minimelfistic
      • HTB Challenge: pwnshop
  • 🤡Clown Chronicles
    • About Me
    • Blogs
      • How to Win A CTF by Overcomplicating Things
      • Exploring Dynamic Invocation for Process Injection in C# and Rust
    • Projects
    • Memes
    • Others
Powered by GitBook
On this page
  • Web (80/443)
  • FTP (21)
  • SSH (22)
  • Telnet (23)
  • SMTP (25)
  • DNS (53)
  • Kerberos (88)
  • MSRPC (135/593)
  • NetBIOS (137/138/139)
  • SMB (139/445)
  • SNMP (161)
  • LDAP (389)
  • MSSQL (1433)
  • MYSQL (3306)
  • RDP (3389)
  • WinRM (5985)
  • Active Directory
  1. Active Directory & Pentest

Check List

My thought process and general guidelines to approach a target

Web (80/443)

  • Fingerprint Web Server

    • Apache/Nginx/IIS Server Headers

    • Etag Headers Information Leakage

    • Source Code (HTTP/JS/CSS) Comments

      • Burp Suite Map → Engagement Tools → Find Comments/Scripts egrep -r '|[^:]/[/*][^/]' .html/.js

    • Metafiles (robots.txt, sitemap.xml, .htaccess, aspnet_client)

    • Old, Backup and Forgotten Files (Wayback URLs)

    • Finding Hidden Parameters

  • Technology Stack

    • CMS & Services

      • Default Credentials & Paths

      • Version Number

  • Identify Entry Point

    • Directory Brute-forcing

    • DNS Subdomain Brute-forcing

    • Virtual Host Brute-forcing

  • Configuration

    • HTTP Methods

    • Security Headers

    • Cipher Suites

    • HTTP Request Smuggling

    • HTTP Strict Transport Security (80 -> 443 Redirection)

    • RIA Cross Domain Policy (crossdomain.xml, clientaccesspolicy.xml)

    • Subdomain Takeover

  • Authentication Management

    • Account Takeover

    • Weak Lockout Policy

    • Weak Password Policy

    • Weak Security Question

    • Weak Password Change Functionality

    • Remember Password Functionality

    • Multi-Factor Authentication

    • Browser Cache Weakness

    • Rate Limiting Controls

  • Authorization Management

    • IDOR

    • Directory Traversal, File Inclusion

    • OAuth & OIDC Testing / SAML Testing

  • Session Management

    • Cookies Attributes

    • Session Hijacking

    • Session Fixation

    • Session Puzzling

    • Session Timeout

    • CSRF

    • Logout Functionality

  • Input Validation

    • SQLi, Reflected XSS, Stored XSS

    • SSTI, XXE, XPATH, LDAP, OS Command Injection

    • HTTP Verb Tampering

    • HTTP Parameter Pollution

    • Prototype Pollution

    • Host Header Injection (CRLF)

    • Server-Side Request Forgery (SSRF)

  • Client Side Testing

    • DOM-XSS, Clickjacking, CORS

  • Business Logic

    • File Uploads

    • Workflow Circumvention

  • Error Handling

    • Verbose Error Information Exposure

    • Stack Traces

  • Miscellaneous

    • Log Poisoning

    • Web Cache Poisoning

    • Web Cache Deception

    • Insecure Deserialization

    • GraphQL

FTP (21)

  • Banner Grabbing

  • Anonymous Authentication

  • Hydra Brute Forcing

  • vsFTPd Backdoor

SSH (22)

  • Banner Grabbing

  • Weak Ciphers & Algos

  • Hydra Brute Forcing

Telnet (23)

  • Vulnerability Check

  • Hydra Brute Forcing

SMTP (25)

  • Username Enumeration

  • Email Information Disclosure

DNS (53)

  • Cache Snooping Remote Information Disclosure

  • Spoofed Request Amplification DDoS

  • Recursive Query Cache Poisoning

Kerberos (88)

  • Domain User Enumeration

  • MS14-068 Vulnerabilities

  • Tools

    • Kerbrute

    • Rubeus

MSRPC (135/593)

  • NULL & Authenticated Session

  • Enumeration

    • Domain Information Query

    • User Queries

    • Group Queries

    • Privileges

    • SID Lookup

    • LSA Query

  • Tools

    • rpcclient

    • rpcinfo

    • rpcdump

NetBIOS (137/138/139)

  • Enumeration

    • Computers

    • Shares

    • Policies

    • Passwords

  • Tools

    • nbtstat

    • nbtscan

    • nmblookup

SMB (139/445)

  • Open Shares

    • SMB NULL Session Authentication (Anonymous)

  • SMB Signing Disabled

    • Relay Attack

  • SMB Version & Protocols

  • MS17-010 Vulnerabilities

  • User Enumeration

  • Tools

    • smbclient

    • smbmap

    • enum4linux

SNMP (161)

  • Agent Default Community Name

    • Public

    • Private

    • Community

  • Enumeration

    • Interfaces

    • Netstat

    • Processes

    • Services

    • Shares

    • Software

    • Users

  • Tools

    • snmpwalk

    • snmpbulkwalk

    • snmpenum

    • snmp-test

    • onesixtyone

LDAP (389)

  • Anonymous Bind

  • Tools

    • ldapsearch

    • ldapdomaindump

    • windapsearch

MSSQL (1433)

MYSQL (3306)

RDP (3389)

  • Network Level Authentication (NLA) Disabled

  • Terminal Services Encryption Level is Medium or Low

  • Terminal Services Encryption Level is not FIPS-140 Compliant

WinRM (5985)

Active Directory

  • No Credentials

    • LLMNR Poisoning or SMB Relay

    • Coerce NTLM Authentication with PetitPotam

    • Enumerate AD Users via SMB NULL sessions or LDAP Anonymous Binds

    • linkedin2username -> Password Spraying

  • With Credentials

    • Lay-of-the-Land - BloodHound, PowerView

    • Credentials Spraying - CrackMapExec, Evil-WinRM, PSExec, SMBExec, WMIExec

    • Kerberos Attacks

    • DACL & GPO Abuse

    • Active Directory Certificate Services (AD CS)

    • Hunt for Juicy Data

      • .txt

      • .vmdk

      • web.config

  • Public Exploits

    • PrintNightmare, ZeroLogon, AutoBlue, BlueKeep

PreviousCertified Red Team Lead (CRTL)NextReverse Engineering

Last updated 1 year ago

🧊
LogoActive directory pentesting: Cheatsheet and beginner guideHack The Box
LogoWindows & Active Directory Exploitation Cheat Sheet and Command ReferenceCas van Cooten
LogoActive Directory | HideAndSec