Unauthenticated Checks

  • Network Scanning

    • Perform comprehensive port scanning
    • Identify services running on the
    • Map out domain infrastructure
  • LLMNR/NBT-NS/mDNS Poisoning

    • Check if LLMNR/NBT-NS/mDNS are enabled and can be poisoned
    • Capture NTLMv2 hashes from broadcast name resolution
    • Link: llmnr_poisoning
  • SMB Signing Check

    • Identify hosts with SMB signing disabled or not required
    • Potential for NTLM relay attacks
    • Link: smb_signing
  • IPv6 Attack Surface

    • Check for IPv6 enabled networks with no IPv6 DNS server
    • Potential for IPv6 DNS takeover
    • Link: ipv6_attacks
  • Null Session Enumeration

    • Check for null session access to systems
    • Enumerate shares, users, groups without authentication
    • Link: null_session
  • Anonymous LDAP Binds

    • Test for anonymous LDAP binding
    • Enumerate domain information without credentials
    • Link: () ldap_techniques
  • Relay Attack Opportunities

    • Identify services vulnerable to NTLM relay
    • Check WebDAV, HTTP endpoints, ADCS Web Enrollment
    • Link: relay_attacks
  • Pre-Windows 2000 Compatibility

  • NFS Shares

    • Identify open NFS exports
    • Check for no_root_squash misconfigurations
    • Look for sensitive data accessible via NFS
    • Link: nfs
  • Password Spraying Opportunities

    • Test common/weak passwords against found usernames
    • Avoid account lockouts by tracking attempts
    • Link: () password_spraying
  • LDAP Passback Opportunities

Low-Privilege Checks

  • Password Policy

  • Kerberoasting

    • Find service accounts with SPN records
    • Extract and crack service account TGS tickets
    • Link: kerberoasting
  • AS-REP Roasting

    • Identify accounts with Kerberos pre-authentication disabled
    • Request and crack AS-REP encryption
    • Link: asreproast
  • Group Policy Preference Passwords

    • Search for encrypted passwords in Group Policy Preferences
    • Decrypt cPassword attributes in GPP files
    • Link: gpp_password
  • BloodHound Analysis

    • Collect domain information using SharpHound or similar
    • Analyze privilege escalation paths
    • Link: bloodhound
  • Accessible File Shares

    • Enumerate readable shares across the domain
    • Look for sensitive files, configuration data, credentials
    • Check for overly permissive share permissions
    • Link: data_pillaging
  • Data Pillaging

    • passwords, pii, phi, tokens, keys, etc…
    • Check user home directories and departmental shares
    • Link: data_pillaging
  • SYSVOL Enumeration

  • DNS Dump

    • Extract DNS records from the domain
    • Map internal network structure
    • Identify potential targets
    • Link: dns_dump
  • Domain Wide Enumeration

    • Comprehensive enumeration of domain objects
    • Map out users, groups, computers, and relationships
    • Identify misconfigurations and security issues
    • Link: domain_wide_enumeration
  • LDAP Enumeration for Sensitive Info

    • Search for passwords/sensitive data in LDAP attributes
    • Check description fields, info fields, and comments
    • Link: () ldap_techniques
  • Local Admin Access Check

  • Machine Account Quota Abuse

    • Check if current user can create computer accounts (default=10)
    • Potential for resource-based constrained delegation attacks
    • Link: machine_account_quota
  • Print Spooler Service

    • Check for systems with Print Spooler enabled
    • Potential for PrintNightmare or other printer exploits
    • Link: () printnightmare
  • Authentication Coercion Points

    • Identify services that can be coerced to authenticate
    • Check for PrinterBug, PetitPotam, ShadowCoerce opportunities
    • Force domain admin authentication via print spooler or EFS-RPC
    • Check for DVCSync exploitation
    • OPSEC Suggestions: Monitor for anomalous network traffic during coercion; use low-frequency attempts to avoid detection
    • Link: authentication_coercion

Stage 3: Local Admin / Service Account Checks

  • Credential Harvesting

    • Extract credentials from LSASS memory
    • Find stored credentials in registry/files
    • Link: credential_dumping
  • NTLM Hash Extraction

    • Extract NTLM hashes from SAM database
    • Look for password reuse across systems
    • Link: ntlm_hash_theft
  • Credential Manager / DPAPI

    • Extract saved credentials from Windows Credential Manager
    • Decrypt DPAPI blobs for stored credentials
    • Link: credential_dumping
  • Token Impersonation

    • Check for impersonation privileges
    • Look for tokens of privileged users on compromised systems
    • Link: () token_impersonation
  • Local Privilege Escalation

  • Scheduled Tasks & Services

    • Analyze scheduled tasks and services for privilege escalation
    • Check for hardcoded credentials or weak permissions
    • Link: () windows_priv_esc
  • Sensitive Registry Keys

    • Check registry for stored credentials
    • Look for autologon passwords, service credentials
    • Link: () windows_priv_esc
  • Browser Data

    • Extract saved passwords from browsers
    • Look for domain credentials in browser storage
    • Link: credential_dumping
  • Lateral Movement Opportunities

  • LAPS Implementation Check

    • Verify LAPS implementation and security
    • Check who can read LAPS passwords
    • Link: () laps_abuse
  • Group Managed Service Accounts

  • MSSQL Server Instances

    • Identify SQL Servers accessible with current credentials
    • Check for linked servers, command execution capabilities
    • Link: mssql_abuse

Stage 4: Domain Privilege Escalation Checks

  • Privileged Group Membership

    • Analyze membership in privileged groups
    • Look for nested group memberships granting excessive privileges
    • Link: group_membership
  • Kerberos Delegation

    • Check for unconstrained delegation
    • Check for constrained delegation misconfigurations
    • Check for resource-based constrained delegation issues
    • Link: kerberos_delegation
  • ACL Misconfigurations

    • Identify dangerous permissions on AD objects
    • Look for WriteDACL, WriteOwner, GenericAll rights
    • Link: - domain_acls
  • Shadow Credentials Attack

    • Check for ability to modify msDS-KeyCredentialLink attribute
    • Potential for certificate-based authentication attacks
    • Link: - shadow_credentials
  • ADCS Vulnerabilities

    • Check for misconfigured certificate templates
    • Look for ESC1-ESC8 vulnerabilities
    • Link: adcs_vulnerabilities
  • Domain Trust Relationships

    • Analyze domain and forest trusts
    • Check for transitive trust relationships that can be abused
    • Link: () forest_domain_trusts
  • Exchange Server Privileges

    • Check for Exchange server privileges that can be abused
    • Look for excessive permissions granted to Exchange servers
    • Link: group_membership
  • SCCM Misconfigurations

    • Assess SCCM deployment security
    • Check for privileges that can be leveraged for code execution
    • Link: sccm_site_takeover
  • Windows Defender / AV Exclusions

Stage 5: Domain Admin / Enterprise Admin Checks

  • DCSync Rights

    • Identify accounts with DCSync capabilities
    • Check for GetChanges/GetChangesAll rights to domain objects
    • Link: dcsync
  • AdminSDHolder Issues

  • krbtgt Account

    • Check krbtgt password rotation practices
    • Potential for Golden Ticket attacks
    • Link: golden_ticket
  • Group Policy Object Security

    • Analyze GPO permissions and settings
    • Look for overly permissive ACLs on GPOs
    • Link: group_policy_abuse
  • Domain Controller Security

  • AD Backup Security

  • Tier Zero Asset Inventory

  • AD Recycle Bin Access

  • AD Database Mounting

    • Check for ability to mount copies of AD database
    • Potential offline credential extraction
    • Link: credential_dumping
  • Domain Controller LSASS Protection

    • Check if credential guard or other LSASS protections are enabled
    • Verify if LSASS runs as a protected process
    • Link: credential_dumping

Additional Checks

  • Pre-Boot Execution Environment (PXE)

  • ZeroLogon

    • Test for CVE-2020-1472 vulnerability
    • Check if domain controllers are patched
    • Link: zerologon
  • NoPac (SamAccountName Spoofing)

  • Alternate Service Name Attacks

  • Default Credentials

    • Check systems for default/unchanged credentials
    • Test known default username/password combinations
    • Link: () default_credentials
  • IPMI Hash Dump

    • Identify IPMI interfaces
    • Attempt to extract password hashes
    • Link: ipmi_hash_dump
  • Cisco Smart Install

    • Identify Cisco devices with Smart Install enabled
    • Check for potential configuration extraction or modification
    • Link: cisco_smart_install