*dir \\\\za.tryhackme.com\\SYSVOL
(uses kerberos first for auth)*
*dir \\\\<DC IP>\\SYSVOL
(uses NTLM) (better to avoid detect in some cases)*
runas.exe /netonly /user:<domain>\\<username> cmd.exe => list sysvol [dir \\\\[*za.tryhackme.com*]\\SYSVOL\\] to assure everything working, if not => $dnsip = "<*DC IP*>" => $index = Get-NetAdapter -Name ['*Ethernet*'] | Select-Object -ExpandProperty 'ifIndex' =>Set-DnsClientServerAddress -InterfaceIndex $index -ServerAddresses $dnsip => nslookup [*za.tryhackme.co*m]
sudo ntpdate t1 #updte time to be as target
vim /etc/resolv.conf=> nslookup [domain] #if got an error without provding the ip then smth still wrong
#Methodology (each time get creds, test smb,kerberos & set user owned in bloodhound):
#1 IRL: llmnr => hash+crack=>spray=>secretsdump=>local admin=>spray --local-admin
#2 kerberosting ⇒ secretsdump ⇒ pass the hash/pass
# After owning DC: persistence (create domain admin acc? & golden ticket)⇒do it again, dump NTDS.dit & crack pass ⇒ enum shares for sensitive info
# if I got lets say creds for a normal user and got nothing else, try to conenct and elvate my privs to local admin