*dir \\\\za.tryhackme.com\\SYSVOL (uses kerberos first for auth)*

*dir \\\\<DC IP>\\SYSVOL (uses NTLM) (better to avoid detect in some cases)*

Theory & commands

runas.exe /netonly /user:<domain>\\<username> cmd.exe => list sysvol [dir \\\\[*za.tryhackme.com*]\\SYSVOL\\] to assure everything working, if not => $dnsip = "<*DC IP*>" => $index = Get-NetAdapter -Name ['*Ethernet*'] | Select-Object -ExpandProperty 'ifIndex' =>Set-DnsClientServerAddress -InterfaceIndex $index -ServerAddresses $dnsip => nslookup [*za.tryhackme.co*m]

sudo ntpdate t1 #updte time to be as target
vim /etc/resolv.conf=> nslookup [domain] #if got an error without provding the ip then smth still wrong
#Methodology (each time get creds, test smb,kerberos & set user owned in bloodhound):
#1 IRL: llmnr => hash+crack=>spray=>secretsdump=>local admin=>spray --local-admin
#2 kerberosting ⇒ secretsdump ⇒ pass the hash/pass
# After owning DC: persistence (create domain admin acc? & golden ticket)⇒do it again, dump NTDS.dit & crack pass ⇒ enum shares for sensitive info

# if I got lets say creds for a normal user and got nothing else, try to conenct and elvate my privs to local admin

Hash capturing


No creds (null session may return some (Disabled/ non-domain/fake/false positive):