🩸BloodyAD
Introduction
sudo apt install bloodyad -yGitHub Repository
Attacking AD using bloodyAD
Read LAPS Password
bloodyAD --host 10.10.10.10 -d domain.htb -u 'user' -p 'password' get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtimeRead GMSA Password
bloodyAD --host 10.10.10.10 -d domain.htb -u 'user' -p 'password' get object 'TARGET' --attr msDS-ManagedPasswordEnable DONT_REQ_PREAUTH for ASREPRoast
Disable ACCOUNTDISABLE to Enable a Disabled User
Add User to a Group
Shadow Credentials Attack
Assign servicePrincipalName (SPN) to User for Kerberoasting Attack
Make User Owner of an Object
Assign GenericAll Permissions Over a User to an Object for Full Control
Change User Password
Add DCSync Permissions Over an Object
Assign Malicious Script to User (Executes on Login)
Create New DNS Record for DNS Spoofing Attacks
Assign Different UPN (userPrincipalName) for UPN Spoofing Attacks
Assign Value to altSecurityIdentities Attribute for X.509/ESC14 Attacks
Notes
Last updated