文章前言
本篇文章中我们将重点介绍如何通过SMB协议和RPC协议来枚举域内信息,下文中使用的工具为rpcclient
信息枚举
Server Information
rpcclient -U Administrator%Ignite@123 192.168.1.172
Domain Information
querydominfo
Enumerating Domain Users
enumdomusers
Enumerating Domain Groups
enumdomgroups
Group Information Queries
querygroup 0x200
User Information Queries
queryuser yashika
Enumerating Privileges
enumprivs
Domain Password Information
getdompwinfo
User Password Information
getusrdompwinfo 0x1f4
Enumerating SID from LSA
lsaenumsid
Creating Domain User
createdomuser hacker
setuserinfo2 hacker 24 Password@1
enumdomusers
Lookup User Names
lookupnames hacker
Enumerating Alias Groups
enumalsgroups builtin
Delete Domain User
deletedomuser hacker
Net Share Enumeration
netshareenum
netshareenumall
Net Share Get Information
netsharegetinfo Confidential
Enumerating Domains
enumdomains
Enumerating Domain Groups
enumdomgroups
enumdomusers
queryusersgroups 0x44f
querygroupmem 0x201
Change Password of User
chgpasswd raj Password@1 Password@987
Create Domain Group
createdomgroup newgroup
enumdomgroups
Delete Domain Group
deletedomgroup newgroup
enumdomgroup
Domain Lookup
lookupdomain ignite
SAM Lookup
samlookupnames domain raj
samlookuprids domain 0x44f
SID Lookup
lsaenumsid
LSA Query
lsaquery
dsroledominfo
LSA Create Account
lookupnames raj
lsacreateaccount S-1-5-21-3232368669-2512470540-2741904768-1103
LSA Group Privileges
lsaenumsid
lookupsids S-1-1-0
lsaenumacctrights S-1-1-0
lsaaddpriv S-1-1-0 SeCreateTokenPrivilege
lsaenumprivsaccount S-1-1-0
lsadelpriv S-1-1-0 SeCreateTokenPrivilege
lsaenumprivsaccount S-1-1-0
LSA Account Privileges
lookupnames raj
lsaaddacctrights S-1-5-21-3232368669-2512470540-2741904768-1103 SeCreateTokenPrivilege
lsaenumprivsaccount S-1-5-21-3232368669-2512470540-2741904768-1103
lsaremoveacctrights S-1-5-21-3232368669-2512470540-2741904768-1103 SeCreateTokenPrivilege
lsaenumprivsaccount S-1-5-21-3232368669-2512470540-2741904768-1103
lsalookupprivvalue SeCreateTokenPrivielge
LSA Security Objects
lsaquerysecobj
文末小结
在本文中,我们能够使用rpcclient工具通过域内的SMB和RPC枚举大量信息,本文可以作为红队攻击和列举域的参考,但也有助于蓝队了解和测试在域上应用的保护及其用户的措施~
原文始发于微信公众号(七芒星实验室):Active Directory Enumeration:RPCClient
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论