Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
Fixing typo error
  • Loading branch information
clem9669 authored Mar 2, 2021
1 parent 2c627e9 commit 975b09d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion windows/active-directory-methodology/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,7 @@ For this phase you need to have **compromised the credentials or a session of a
### Enumeration

If you have some valid credentials or a shell as a domain user, **you should remember that the options given before are still options to compromise other users**.
Regarding [**ASREPRoast** ](asreproast.md)you can now find every possible vulnerable user, and regarding **\*\*\[**Password Spraying**\]\(password-spraying.md\) you can get a** list of all the usernames **and try the password of the compromised account \(if you know it\). It's very easy to obtain all the domain usernames from Windows \(`net user /domain` ,`Get-DomainUser`or `wmic useraccount get name,sid`\). In** linux\*\* you can use: `GetADUsers.py -all -dc-ip 10.10.10.110 domain.com/username`
Regarding [**ASREPRoast**](asreproast.md)you can now find every possible vulnerable user, and regarding [**Password Spraying**](password-spraying.md) you can get a **list of all the usernames** and try the password of the compromised account \(if you know it\). It's very easy to obtain all the domain usernames from Windows \(`net user /domain` ,`Get-DomainUser`or `wmic useraccount get name,sid`\). In** linux\*\* you can use: `GetADUsers.py -all -dc-ip 10.10.10.110 domain.com/username`

Having compromised an account is a **big step to start compromising the whole domain**, because you are going to be able to start the **Active Directory Enumeration:**

Expand Down

0 comments on commit 975b09d

Please sign in to comment.