Post-Compromise Strategy
Overview
Once you've gained initial access to a domain environment, the real work begins. This guide outlines a systematic approach to post-compromise activities, focusing on privilege escalation, lateral movement, and achieving persistent domain access.
The Question: "We have an account, now what?"
After successfully compromising an account (through password spraying, phishing, or other initial access methods), you need a structured approach to maximize the compromise and achieve your penetration testing objectives.
Phase 1: Search the Quick Wins
1. Kerberoasting
Goal: Extract service account passwords that can be cracked offline
# Using GetUserSPNs.py (Impacket)
GetUserSPNs.py domain.local/username:password -dc-ip dc_ip -request
# Using Rubeus (if you have a Windows session)
Rubeus.exe kerberoast /outfile:kerberoast_hashes.txt
# Crack the hashes
hashcat -m 13100 kerberoast_hashes.txt /usr/share/wordlists/rockyou.txt
# Expected outcomes:
# - Service account passwords
# - Potential admin-level accounts
# - Lateral movement opportunities2. Secretsdump
Goal: Extract password hashes and secrets from accessible systems
3. Pass the Hash / Pass the Password
Goal: Use extracted credentials for lateral movement
Quick Win Assessment Checklist
Phase 2: No Quick Wins? Dig Deep!
1. Enumerate with Bloodhound
Goal: Map the domain environment and find privilege escalation paths
Key Bloodhound Queries for Post-Compromise
2. Analyze Account Access
Goal: Understand where your compromised account has legitimate access
Access Analysis Questions
3. Old Vulnerabilities Die Hard
Goal: Look for unpatched systems and legacy vulnerabilities
Common Legacy Vulnerabilities to Check
Phase 3: Think Outside the Box
Creative Enumeration Techniques
1. LDAP Enumeration for Hidden Information
2. Credential Hunting in Unexpected Places
3. Living Off The Land Techniques
Strategic Decision Tree
When Quick Wins Succeed
When Deep Enumeration is Required
Post-Compromise Methodology Summary
Phase 1: Quick Assessment (15-30 minutes)
Kerberoasting - Look for weak service account passwords
Secretsdump - Extract hashes from accessible systems
Credential Testing - Test extracted credentials across domain
Phase 2: Deep Enumeration (1-2 hours)
Bloodhound Analysis - Map privilege escalation paths
Access Mapping - Understand account permissions and access
Vulnerability Scanning - Look for unpatched legacy systems
Phase 3: Creative Approaches (Ongoing)
LDAP Deep Dive - Extract hidden information from AD
Credential Hunting - Search files and registry for passwords
Living Off The Land - Use legitimate tools for enumeration
PJPT Exam Strategy
Time Management for Post-Compromise
Documentation Priority
Initial Access Vector - How you gained the first account
Quick Win Results - What credentials/access you gained immediately
Privilege Escalation Path - Step-by-step path to domain admin
Lateral Movement Evidence - Systems accessed and methods used
Persistence Mechanisms - How you maintained access
Impact Assessment - What data/systems could be compromised
Remember: The goal is not just to get domain admin, but to demonstrate a complete understanding of the attack chain and the business impact of the compromise. Always think like an attacker but document like a professional penetration tester.
Last updated