Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
      • ADchevron-right
        • ACL Abuse
        • AD CS Abusechevron-right
        • ADIDNS Abuse
        • Attack Trusts
        • Attack RODCs
        • AV / EDR Evasionchevron-right
        • Authentication Coercion
        • Credentials Harvestingchevron-right
          • From Memorychevron-right
          • Credential Phishing
          • DCSync
          • DPAPI
          • KeePass
          • Linux
          • LSA
          • NetSync
          • NPLogonNotify
          • NTDS
          • Password Filter
          • RDP
          • SAM
          • SSH Clients
          • SSPI
          • Windows Hello
        • Discovery
        • DnsAdmins
        • Dominance
        • gMSA / dMSA
        • GPO Abuse
        • Kerberoschevron-right
        • Key Credentials Abuse
        • LAPS
        • Lateral Movementchevron-right
        • LDAP
        • NTLMchevron-right
        • Password Spraying
        • Post Exploitation
        • Pre-created Computers Abuse
        • PrivExchange
        • Privileges Abusechevron-right
        • RID Cycling
        • SCCM Abuse
        • SMB
        • Token Manipulation
        • User Hunt
        • WSUS
        • Zerologon
      • Azure ADchevron-right
      • DevOpschevron-right
      • DBMSchevron-right
      • Authentication Brute Force
      • File Transfer
      • IPMI
      • Kiosk Breakout
      • Low-Hanging Fruits
      • LPE
      • Networkschevron-right
      • NFS
      • Persistence
      • Pivoting
      • Post Exploitation
      • SNMP
      • SSH
      • TFTP
      • VNC
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚒️Pentestchevron-right
  2. Infrastructurechevron-right
  3. ADchevron-right
  4. Credentials Harvesting

NetSync

Silver Ticket -> Netlogon (MS-NRPC)

  • https://tools.thehacker.recipes/mimikatz/modules/lsadump/netsyncarrow-up-right

  • https://trustedsec.com/blog/the-tale-of-the-lost-but-not-forgotten-undocumented-netsync-part-1arrow-up-right

  • https://trustedsec.com/blog/the-tale-of-the-lost-but-not-forgotten-undocumented-netsync-part-2arrow-up-right

  • https://gist.github.com/ThePirateWhoSmellsOfSunflowers/4efeea0e405ee8a53c8aa9f4f515d9adarrow-up-right

hashtag
OffensiveAdmin

  • https://github.com/4ndr3w6/Presentations/tree/main/Texas_Cyber_Summit_2023arrow-up-right

  • [PDF] You (Dis)liked DCSync? Wait for NetSync (Charlie Clark, Andrew Schwartz)arrow-up-right

Last updated 8 months ago