Domain Admin… and Beyond
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要理解文章的内容。文章是关于在获得域管理员权限后,渗透测试人员应该采取的步骤,以展示实际风险。作者Andrew Trexler提到了几个关键点:NTDS转储、Bloodhound工具、用户添加测试、黄金票证以及共享枚举。 接下来,我需要把这些要点浓缩成一句话。要注意控制字数,确保信息准确且简洁。可能需要提到获得域管理员后的行动、工具使用以及对企业的影响。最后,确保总结直接描述内容,不使用“文章总结”之类的开头。 这样思考下来,总结应该涵盖主要行动和工具,并说明其对企业安全的影响。 </think> 文章讨论了渗透测试中获得域管理员权限后如何进一步展示实际风险,包括NTDS转储、Bloodhound枚举、用户添加测试、黄金票证攻击和共享枚举等技术手段,强调通过具体案例和工具帮助企业识别和修复安全漏洞。 2026-4-2 06:56:47 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

Mark Puckett

Press enter or click to view image in full size

Raxis Principal Penetration Tester Andrew Trexler just published a piece on our blog about what to do after popping Domain Admin. Our team accomplishes this on most internal network and cloud penetration tests and on most red team engagements. Pentesters & in-the-weeds IT folks know that getting DA is a big deal, but that on its own doesn’t show our clients the damage that can be done by an attacker who gets DA. It’s our job to clearly show the risks.

Andrew’s write-up hits on something we don’t discuss enough in our field: what happens after the win. Too many pentesters treat DA like a finish line when it’s really just the starting gun for the actual value demonstration phase.

The NTDS Dump: Not Always a Cakewalk

Andrew mentions that secretsdump works 99% of the time for pulling NTDS.dit, and he’s not wrong. For those rare edge cases, Andrew points us to one of his past blog posts showing how to use Evil-WinRM to get NTDS manually.

Cracking those hashes and reporting on weak passwords and common patterns helps the customer understand policy and configuration changes that would lock down their environment.

Bloodhound: The Gift That Keeps on Giving

Andrew highlights how easy Bloodhound makes enumerating accounts, desktops, and other domain objects, allowing pentesters to map out more attack paths and highlighting possible misconfigurations.

Especially on internal network engagements, pentester want to discover and report as many gaps as possible so that the customer can remediate them. Bloodhound makes covering the entire network much easier.

Get Mark Puckett’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

User Addition: Testing Both Persistence and Detection

I love that Andrew uses Shawn Spencer and Gus as his test accounts. We’ve got a running joke in the office about themed persistence accounts. I’ve seen everything from Fight Club characters to obscure Star Trek references in DA groups.

The real value here is exactly what Andrew calls out: detection capability testing. If we can add users to Domain Admins without triggering a SIEM alert or SOC response, that’s an important finding.

Golden Tickets: The Persistence That Keeps on Giving

Making golden tickets is a stealthier way to obtain persistence on a domain using the krbtgt user’s password hash to allow Kerberos to sign and create Kerberos tickets. With that hash, a pentester can use this method to create tickets for any user on the domain.

Let me hammer home Andrew’s post-attack guidance. When we demonstrate a golden ticket attack, the krbtgt password needs to be reset twice. Here’s why: the account maintains a password history of two to ensure domain controller replication doesn’t break. You’ll want to hand the client exact remediation steps, including the double password reset requirement and a recommended waiting period between to prevent authentication issues with other domain controllers.

Share Enumeration: Translating Technical to Business Impact

Andrew’s final point about exploring network shares is often gold when debriefing non-technical management teams. Finding PII, credentials, or sensitive financial data in shares transforms “we got DA” into “here’s exactly what an attacker steals next.”

We typically include screenshots and sanitized samples in our reports. Executive leadership understands the risk when you show them their company’s financials or customer databases sitting in an unprotected share, accessible after a single privilege escalation.

The Bigger Picture

Andrew’s guide is focused on providing penetration test clients value. Getting DA is exciting, but our job is to demonstrate real-world impact and give clients actionable intelligence to improve their security posture.


文章来源: https://infosecwriteups.com/domain-admin-and-beyond-b33a93e35d73?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh