Miscellaneous Misconfigurations

This section covers various misconfigurations that can be leveraged for enumeration and privilege escalation within a Windows domain environment.

. Import Security Assessment Module

Command:

Import-Module .\SecurityAssessment.ps1
  • Description: Used to import the SecurityAssessment module for security auditing. Performed from a Windows-based host.


2. Check Spooler Service Status

Command:

Get-SpoolStatus -ComputerName ACADEMYEA-DC01.INLANEFREIGHT.LOCAL
  • Description: SecurityAssessment.ps1 tool used to check for the MS-PRN Printer bug. Performed from a Windows-based host.


3. Enumerate DNS Records via LDAP

Command:

adidnsdump -u inlanefreight\\forend ldap://172.16.5.5
  • Description: Resolves all records in a DNS zone over LDAP. Performed from a Linux-based host.

Command:

adidnsdump -u inlanefreight\\forend ldap://172.16.5.5 -r
  • Description: Resolves unknown records in a DNS zone by performing an A query (-r). Performed from a Linux-based host.


4. Retrieve User Descriptions

Command:

Get-DomainUser * | Select-Object samaccountname,description
  • Description: PowerView command used to display the description field of domain users. Performed from a Windows-based host.


5. Check for Password Not Required Accounts

Command:

Get-DomainUser -UACFilter PASSWD_NOTREQD | Select-Object samaccountname,useraccountcontrol
  • Description: PowerView tool used to identify domain users with the PASSWD_NOTREQD flag. Performed from a Windows-based host.


6. List SYSVOL Scripts

Command:

ls \\academy-eadc01\SYSVOL\INLANEFREIGHT.LOCAL\scripts
  • Description: Lists the contents of the SYSVOL scripts folder, which may contain sensitive scripts with credentials. Performed from a Windows-based host.

Last updated