Skip to content

Kerberos

The Kerberos protocol uses port 88 (both TCP and UDP). When enumerating an Active Directory environment, we can often locate Domain Controllers by performing port scans looking for open port 88 using a tool such as Nmap.


DNS

  • AD DS uses DNS to allow clients to locate the Domain controllers and for DCs to commx amongst themselves

DNS lookup

Forward - nslookup inlanefreight.local

Reverse - nslookup 172.16.6.5

Find IP of a host - nslookup ACADEMY-EA-DC01


LDAP

  • used for directory lookups
  • LDAP is the language of applications communicating with servers that provide directory services.
  • The relationship between AD and LDAP can be compared to Apache and HTTP. The same way Apache is a web server that uses the HTTP protocol, Active Directory is a directory server that uses the LDAP protocol.

MSRPC

  • lsarpc
  • netlogon
  • samr
  • drsuapi

NTLM

LM

  • LAN Manager or LANMAN
  • old hashing
  • max 14 chars

NTHash (NTLM)

  • modern Windows systems using the NTLM hash
  • challenge response.
  • hashes stored in SAM (local) or NTDS.DIT (AD)
  • NT HASH algorithm -> MD4(UTF-16-LE(password))

Neither LM nor NT use salts

NTLMv1 (Net-NTLMv1)

  • cant be used for pass the hash
  • uses both NT and LM hash

NTLMv2 (Net-NTLMv2)

Domain Cached Creds (MSCache2)

  • The above methods require commx with the DC
  • If the DC is not reachable, tje Domain Cached Credentials (DCC) can be used.
  • Cant be used in Pass the hash
  • Hosts save the last ten hashes for any domain users that successfully log into the machine in the HKEY_LOCAL_MACHINE\SECURITY\Cache registry key.
  • eg: $DCC2$10240#bjones#e4e938d12fe5974dc42a90120bd9c90f