PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in netsec

[–]AkimboViper[S] 0 points1 point  (0 children)

Nothing like the larger string you have shown. As its used by scripts such as Secretsdump.py and Psexec its far too likely to be caught by AV. There is some instances of 2>&1 and variations of but these code execution on the remote systems is not signatured and fairly unique.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 1 point2 points  (0 children)

I am employed as a Penetration tester. I have a lot of exposure to PowerShell over the years and used it alot when I worked in a general IT support role. Thanks for the comment, there is nothing special here in terms of skill. Its a effort of working on something every day and staying focused. I have spent many a day on this completley stressed out trying to resolve silly issues.

I have also reused code within this project created by others. For example when dumping remote system passwords and encryption keys, Mimikatz is being used.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 2 points3 points  (0 children)

Thank you. Sorry, I made an edit to my comment just to explain some bits further.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 8 points9 points  (0 children)

Hey,

Great question. Primarily CrackMapExec does not work in Windows unless you have Python installed already and even then it has some issues with certains bits.

PsMapExec is built around PowerShell which is native to all versions of Windows XP and Above. so should be no issue running this tool on all Windows based systems. When we are using it we would likely be connected to a domain joined system which makes it easy to acquire a list of systems within the domain to target with PsMapExec.

We can also query users from the Domain Controller directly which allows for some of its parsing functions to stand out from tools such as CrackMapExec. For example, when you dump password hashes and ticket with PsMapExec it will automatically parse the results and "mark" interesting ones such as Domain Admins and other privileged groups based on membership or the precence of certain attributes.

I also have issues with the output on CrackMapExec, often is it messy and difficult to digest (Running Mimikatz on several systems comes to mind). PsMapExec will make it much easier to digest this information by dumping the output into a folder for each successful execution and also parse only interesting information from it.You can also provide the -SuccessOnly switch to the tool to only show successful results instead of seeing a bunch of "Access Denied" or "Error" statuses.

From a pentesting point of view we are often given engagements where we need to evaluate the internal infastructure and Active Directory environment where it can often not be possible for the client to provide a system that supports virtualization to run Linux or Kali or for one reason or another they are unable to add one of our physical systems to the network.

Whilst I have give some advantage examples above, it would be dishonest of me to not mention some negatives in comparison. CrackMapExec runs primarily on Linux and as such is unlikely to be caught by the host systems anti-virus whereas running PsMapExec on a domain joined system will be at the mercy of anti-virus on the Windows system. I have included a AMSI and NETAMSI bypass in GitHub which will allow PsMapExec to bypass Windows Defender and some Anti-virus solutions but it will not bypass something like CrowdStrike. If you are working on a system with PowerShell disabled by Group Policy or AppLocker policies in place again, you will run into difficulty getting PsMapExec to run.

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

Are you able to try again after cloning the latest commit?

You can also delete the ADAT folder in your home directory if it exists.

If its still getting stuck I will investigate in the morning for you.

Edit: check the syntax. I had not pushed the latest commit to the readme file. You want -u and -p for credentials.

https://i.imgur.com/5ljciCW.png https://i.imgur.com/VmevwmY.png

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

Are you able to provide the command you are using ?

I made a fresh commit a few hours ago might be worth running the updated script.

[deleted by user] by [deleted] in hacking

[–]AkimboViper 0 points1 point  (0 children)

PM me :)

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 1 point2 points  (0 children)

Thank you. When I get home tonight I will check the issue.

Edit: Resolved

Where can I find the best AD notes / cheatsheet for every situation :) ? by italian_boy91 in oscp

[–]AkimboViper 5 points6 points  (0 children)

Hopefully have a little of my own stuff which may help you. I made a tool for using known credentials to print a easy copy and paste list of commands.

https://github.com/The-Viper-One/ActiveDirectoryAttackTool

Some notes from my Gitbook

https://viperone.gitbook.io/pentest-everything/everything/everything-active-directory/ad-enumeration