Now we can start Domain user-hunting ,
in order to be a domain admin we need to find a MACHINE whose user is a DOMAIN ADMIN and we as a local user have the ACCESS / SESSION
After finding that machine we try to gain access or EXECUTE WINDOW COMMAND and aftern that we need to extract the HASH of the user
invoke-userhunter-checkaccess
find-domainuserlocation
dcorp\ciadmin ==> svcadmin => dcorp-dc
we (dcorp\student171) got reverse shell as ciadmin (dcorp\ciadmin) now we need to enumerate Domain Admin user but before that we need to do 3 things
Bypass and script loading
Do sbloginbypass in reverse shell , but first host the file on HFS
find out the machines on which we have local admin privileges
gaining access or exeuting command directly
When executing mimikatz or safetykatz remote machine blocking us
Let's check if Applocker is configured on dcorp-adminsrv
yes it is configured lets go through the policies of applocker
we can also check this by doing
Default rule is enabled the result we got = All scripts located in the Program Files folder" Description="Allows members of the Everyone group to run scripts that are located in the Program Files folder.
over pass the hash
The new process (cmd or powershell) that starts has srvadmin privileges. Check if srvadmin has admin privileges on any other machine
now we are srvadmin , and after checking our access on machines
we found that dcorp-mgmt (svcadmin)