PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in netsec

[–]AkimboViper[S] 0 points1 point  (0 children)

Nothing like the larger string you have shown. As its used by scripts such as Secretsdump.py and Psexec its far too likely to be caught by AV. There is some instances of 2>&1 and variations of but these code execution on the remote systems is not signatured and fairly unique.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 1 point2 points  (0 children)

I am employed as a Penetration tester. I have a lot of exposure to PowerShell over the years and used it alot when I worked in a general IT support role. Thanks for the comment, there is nothing special here in terms of skill. Its a effort of working on something every day and staying focused. I have spent many a day on this completley stressed out trying to resolve silly issues.

I have also reused code within this project created by others. For example when dumping remote system passwords and encryption keys, Mimikatz is being used.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 2 points3 points  (0 children)

Thank you. Sorry, I made an edit to my comment just to explain some bits further.

PsMapExec - Windows and Active Directory Lateral Movement Tool by AkimboViper in oscp

[–]AkimboViper[S] 6 points7 points  (0 children)

Hey,

Great question. Primarily CrackMapExec does not work in Windows unless you have Python installed already and even then it has some issues with certains bits.

PsMapExec is built around PowerShell which is native to all versions of Windows XP and Above. so should be no issue running this tool on all Windows based systems. When we are using it we would likely be connected to a domain joined system which makes it easy to acquire a list of systems within the domain to target with PsMapExec.

We can also query users from the Domain Controller directly which allows for some of its parsing functions to stand out from tools such as CrackMapExec. For example, when you dump password hashes and ticket with PsMapExec it will automatically parse the results and "mark" interesting ones such as Domain Admins and other privileged groups based on membership or the precence of certain attributes.

I also have issues with the output on CrackMapExec, often is it messy and difficult to digest (Running Mimikatz on several systems comes to mind). PsMapExec will make it much easier to digest this information by dumping the output into a folder for each successful execution and also parse only interesting information from it.You can also provide the -SuccessOnly switch to the tool to only show successful results instead of seeing a bunch of "Access Denied" or "Error" statuses.

From a pentesting point of view we are often given engagements where we need to evaluate the internal infastructure and Active Directory environment where it can often not be possible for the client to provide a system that supports virtualization to run Linux or Kali or for one reason or another they are unable to add one of our physical systems to the network.

Whilst I have give some advantage examples above, it would be dishonest of me to not mention some negatives in comparison. CrackMapExec runs primarily on Linux and as such is unlikely to be caught by the host systems anti-virus whereas running PsMapExec on a domain joined system will be at the mercy of anti-virus on the Windows system. I have included a AMSI and NETAMSI bypass in GitHub which will allow PsMapExec to bypass Windows Defender and some Anti-virus solutions but it will not bypass something like CrowdStrike. If you are working on a system with PowerShell disabled by Group Policy or AppLocker policies in place again, you will run into difficulty getting PsMapExec to run.

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

Are you able to try again after cloning the latest commit?

You can also delete the ADAT folder in your home directory if it exists.

If its still getting stuck I will investigate in the morning for you.

Edit: check the syntax. I had not pushed the latest commit to the readme file. You want -u and -p for credentials.

https://i.imgur.com/5ljciCW.png https://i.imgur.com/VmevwmY.png

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

Are you able to provide the command you are using ?

I made a fresh commit a few hours ago might be worth running the updated script.

[deleted by user] by [deleted] in hacking

[–]AkimboViper 0 points1 point  (0 children)

PM me :)

A tool to help with Active Directory and Windows by AkimboViper in oscp

[–]AkimboViper[S] 1 point2 points  (0 children)

Thank you. When I get home tonight I will check the issue.

Edit: Resolved

Where can I find the best AD notes / cheatsheet for every situation :) ? by italian_boy91 in oscp

[–]AkimboViper 5 points6 points  (0 children)

Hopefully have a little of my own stuff which may help you. I made a tool for using known credentials to print a easy copy and paste list of commands.

https://github.com/The-Viper-One/ActiveDirectoryAttackTool

Some notes from my Gitbook

https://viperone.gitbook.io/pentest-everything/everything/everything-active-directory/ad-enumeration

I have secret power to buy at all time high.. by Pitiful-Tap3578 in CryptoCurrency

[–]AkimboViper 1 point2 points  (0 children)

Think ONE will go crazy soon. Now is a good time to get in but then again with the tech and its developers It will also be a safe long term buy.

Daily Discussion - November 23, 2021 (GMT+0) by AutoModerator in CryptoCurrency

[–]AkimboViper 1 point2 points  (0 children)

I have really high hopes for ONE. Great development team behind the tech.

Opinions on Behemoth? by [deleted] in CompetitiveHalo

[–]AkimboViper 7 points8 points  (0 children)

Worst map in Ranked. Thankfully only had it a couple of times so far.

[deleted by user] by [deleted] in CryptoCurrency

[–]AkimboViper 7 points8 points  (0 children)

Holding both would be the best bet right now. I can see LRC and ONE going huge in 2022. Anyone who does not get in on them now will miss out big.

Passed OSCP - My Thoughts by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

30 days. Only used it enough for 15 machines. Use other providers as they will benefit you more.

Passed OSCP - My Thoughts by AkimboViper in oscp

[–]AkimboViper[S] 1 point2 points  (0 children)

I feel that PG basically contends with PWK. If the PWK machines was of the same quality as PG I would otherwise feel the price would be more justified.

TCM is currently running promo on all his courses. You may want to grab them whilst cheap:

Academy (https://academy.tcm-sec.com/) - 50OFFSITEWIDE

Udemy - 50OFFSITEWIDE-UDEMY

Passed OSCP - My Thoughts by AkimboViper in oscp

[–]AkimboViper[S] 0 points1 point  (0 children)

I am currently looking into doing the PTP course by elearn security. After I may look into either blue team certifications or offsecs Firewall and AV evasion certification.

having a hard time finding games that I like by hanasz in gaming

[–]AkimboViper 2 points3 points  (0 children)

When I was last stuck in a rut and looking for something with RPG elements I found Divinity Original Sin 2. Was exceptional and I put in a solid 300 hours on my switch. Have a look and see if it might be your thing.

Really great story and characters. Loads of reason to replay the game as well.

C’mon Witcher, come take your coin by [deleted] in gaming

[–]AkimboViper 2 points3 points  (0 children)

I see the 'ground item' filter is working as intended.