Post-Compromise Strategy

Overview

Once you've gained initial access to a domain environment, the real work begins. This guide outlines a systematic approach to post-compromise activities, focusing on privilege escalation, lateral movement, and achieving persistent domain access.

The Question: "We have an account, now what?"

After successfully compromising an account (through password spraying, phishing, or other initial access methods), you need a structured approach to maximize the compromise and achieve your penetration testing objectives.

Phase 1: Search the Quick Wins

1. Kerberoasting

Goal: Extract service account passwords that can be cracked offline

# Using GetUserSPNs.py (Impacket)
GetUserSPNs.py domain.local/username:password -dc-ip dc_ip -request

# Using Rubeus (if you have a Windows session)
Rubeus.exe kerberoast /outfile:kerberoast_hashes.txt

# Crack the hashes
hashcat -m 13100 kerberoast_hashes.txt /usr/share/wordlists/rockyou.txt

# Expected outcomes:
# - Service account passwords
# - Potential admin-level accounts
# - Lateral movement opportunities

2. Secretsdump

Goal: Extract password hashes and secrets from accessible systems

3. Pass the Hash / Pass the Password

Goal: Use extracted credentials for lateral movement

Quick Win Assessment Checklist

Phase 2: No Quick Wins? Dig Deep!

1. Enumerate with Bloodhound

Goal: Map the domain environment and find privilege escalation paths

Key Bloodhound Queries for Post-Compromise

2. Analyze Account Access

Goal: Understand where your compromised account has legitimate access

Access Analysis Questions

3. Old Vulnerabilities Die Hard

Goal: Look for unpatched systems and legacy vulnerabilities

Common Legacy Vulnerabilities to Check

Phase 3: Think Outside the Box

Creative Enumeration Techniques

1. LDAP Enumeration for Hidden Information

2. Credential Hunting in Unexpected Places

3. Living Off The Land Techniques

Strategic Decision Tree

When Quick Wins Succeed

When Deep Enumeration is Required

Post-Compromise Methodology Summary

Phase 1: Quick Assessment (15-30 minutes)

  1. Kerberoasting - Look for weak service account passwords

  2. Secretsdump - Extract hashes from accessible systems

  3. Credential Testing - Test extracted credentials across domain

Phase 2: Deep Enumeration (1-2 hours)

  1. Bloodhound Analysis - Map privilege escalation paths

  2. Access Mapping - Understand account permissions and access

  3. Vulnerability Scanning - Look for unpatched legacy systems

Phase 3: Creative Approaches (Ongoing)

  1. LDAP Deep Dive - Extract hidden information from AD

  2. Credential Hunting - Search files and registry for passwords

  3. Living Off The Land - Use legitimate tools for enumeration

PJPT Exam Strategy

Time Management for Post-Compromise

Documentation Priority

  1. Initial Access Vector - How you gained the first account

  2. Quick Win Results - What credentials/access you gained immediately

  3. Privilege Escalation Path - Step-by-step path to domain admin

  4. Lateral Movement Evidence - Systems accessed and methods used

  5. Persistence Mechanisms - How you maintained access

  6. Impact Assessment - What data/systems could be compromised


Remember: The goal is not just to get domain admin, but to demonstrate a complete understanding of the attack chain and the business impact of the compromise. Always think like an attacker but document like a professional penetration tester.

Last updated