https://tryhackme.com/room/adenumeration

Task 1 - Why AD Enumeration

Connecting to the Network

Configure DNS by adding THMDC's IP to the DNS Network Manager > Advanced Network Configuration > Your Connection > IPv4 Settings

Untitled

Then restart the resolved service

sudo systemctl restart NetworkManager

Requesting Your Credentials

For SSH access - Getting credentials from http://distributor.za.tryhackme.com/creds

ssh za.tryhackme.com\\\\<AD_Username>@thmjmp1.za.tryhackme.com

Task 2 - Credential Injection

This room will introduce the built in Microsoft cmd tools called runas.exe

If we have the AD credentials in the format of <username>:<password>, we can use runas.exe

runas.exe /netonly /user:<domain>\\<username> cmd.exe

Once you run this command, you will be prompted to supply a password. Note that since we added the /netonly parameter, the credentials will not be verified directly by a domain controller so that it will accept any password. We still need to confirm that the network credentials are loaded successfully and correctly.

Configuring DNS on Powershell

$dnsip = "<DC IP>"
$index = Get-NetAdapter -Name 'Ethernet' | Select-Object -ExpandProperty 'ifIndex'
Set-DnsClientServerAddress -InterfaceIndex $index -ServerAddresses $dnsip

Then viewing the SYSVOL directory