Added this line to SharpHound.ps1 before transfering so I could run the command right away
Victim
BloodHound Installation
Enumeration w/ Powerview
Kali
Victim
Run below to be able to run PowerView commands.
Enumerate the domain users.
Enumerate the domain groups.
Find Shared folders.
Get Operating systems on the network.
Enumeration w/ Bloodhound
Setup and get loot with Bloodhound.
Victim
Transfer Bloodhound results back to Kali. SCP can be used in this case
Kali
Mapping the network w/ BloodHound
We can just drag the zip file to bloodhound to import it.
Find all Domain Admins
List all Kerberostable accounts
Dumping hashes w/ mimikatz
Kali
Victim
Victim - Mimikatz
Copy to Kali output back to Kali
Output only the hashes and remove all duplicates into a new file.
Kali
Kali
Golden Ticket Attacks w/ mimikatz
Kali
Dump the krbtgt Hash
Victim
This dumps the hash and security identifier of the Kerberos Ticket Granting Ticket account allowing you to create a golden ticket. Take note of what is outlined in red you'll need it to create the golden ticket.
Victim - Mimikatz
Create a Golden Ticket
Victim - Mimikatz
Use the Golden Ticket to access other machine
This will open a new command prompt with elevated privileges to all machines.Access other Machines! - You will now have another command prompt with access to all other machines on the network.
Victim - Mimikatz
This doesn't actually work. Because of how tryhackme is setup but you would then be able to access other machines. In the example below you'd need to find out what other machines exists to pull this off.