Linux AD Lab
Home
  • 💕Altered Security
  • Course Content
  • Port Scanning
    • List of Tools
    • Hands-on 1
  • 4️⃣Meta sploit
    • Page 10
    • Hands-On 2
  • 5️⃣Domain Enumeration
    • AD Module and PowerView
    • Hand-On 3
  • 6️⃣Lateral-Movement - Extracting Credential
    • 🔥Credentials
    • Hans-On 4
  • 7️⃣Lateral-Movement - Credential Spraying
    • Spraying Attack
    • Hands-On 5
  • 8️⃣Lateral-Movement - PS Remoting
    • Live of the Land
    • Hands-On 6
  • Application Whitelisting
    • AWL Bypass
    • Hand-On 7
  • Abusing-SQL Servers
    • Page 4
  • ACL Attacks
    • Page 5
  • Domain Privilege Escalation
    • Page 6
  • Domain Dominance
    • Page 7
  • Detection And Defense
    • Page 8
  • Data
    • COLA-FILESRV
    • COLA-SRV2
    • COLA-SAFE
Powered by GitBook
On this page

Was this helpful?

  1. Lateral-Movement - Extracting Credential

Credentials

PreviousHand-On 3NextHans-On 4

Last updated 1 year ago

Was this helpful?

  • Enumerate AD using PowerShell, .Net, and Python tools.

  • Find interesting information like delegation issues, credentials in clear text, etc.

  • Enumerate and abuse Restricted Groups.

Once we elevated access to at least one target machine, we can go ahead and extract credentials from it.

A non-exhaustive list of locations on a Windows machine we can extract credentials from

– Memory of the lsass process

– LSASecrets

– SAM

– Credential Vault

– Unattend.xml and sysprep.xml

– Autologon credentials

– PowerShell console history

Location

LSASecrets

SAM

Credential Vault

Unattend.xml

sysprep.xml

Autologon credentials

PowerShell console history

Lsass Memory

Domain users, service accounts, clear text

6️⃣
🔥