01 / Reconnaissance
Initial passive and semi-active information gathering focused on identifying the AD environment: domain names, domain controllers, DNS records and exposed services — before full enumeration begins.
export TARGET_IP=10.10.10.10 export ATTACKER_IP=10.10.14.1 export DOMAIN=corp.local export DC_IP=10.10.10.10 export DC_HOSTNAME=DC01 export USERNAME=j.doe export PASSWORD='Password123!'
nxc smb $TARGET_IP
sudo nano /etc/hosts # add: $DC_IP $DC_HOSTNAME.$DOMAIN $DC_HOSTNAME
dnsrecon -d $DOMAIN -n $TARGET_IP -t std,brt,axfr
dig @$TARGET_IP $DOMAIN AXFR
dig @$TARGET_IP _ldap._tcp.$DOMAIN SRV
dig @$TARGET_IP _kerberos._tcp.$DOMAIN SRV
gobuster vhost -u http://$TARGET_IP:$TARGET_PORT \ -w /usr/share/seclists/Discovery/DNS/namelist.txt --xs 400
ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt \ -H "Host: FUZZ.$DOMAIN" -u http://$TARGET_IP:$TARGET_PORT -fc 302
/usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt /usr/share/seclists/Discovery/DNS/namelist.txt