This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Auditing Active Directory Offline | |
| The following instrutions will teach you how to analyze Microsoft Active Directory using offine techniques. It does not require persistent connection to the Domain Controller. Instead we will be using an copy of ntds.dit file, a copy of SYSVOL directory, and a copy of SYSTEM registry hive. All of these data points are easily obtained from a Domain Controller using built-in Windows utilities. | |
| This tutorial will cover setting up proper tools, obtaining neccesary information, and analyzing Active Directory. | |
| I. Set-up | |
| We would use Windows 10 Pro workstattion for this audit, however Windows 7 would work as well. Additionally we would need a virtualized instance of Windows Server to mount an offline copy of ntds.dit. We would use Windows Server 2016 Core guest OS in VirtualBox. Finally we need to install audit tools. We would use AD-Control-Path (add url) and DSInternals powershel module (add url). | |
| Note: I strongly suggest using VirtualBox for virtualization rather than VMWare |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| MATCH (u:User)-[r:AdminTo|MemberOf*1..]->(c:Computer | |
| RETURN u.name | |
| That’ll return a list of users who have admin rights on at least one system either explicitly or through group membership | |
| --------------- | |
| MATCH | |
| (U:User)-[r:MemberOf|:AdminTo*1..]->(C:Computer) | |
| WITH | |
| U.name as n, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Simple No-ip.com Dynamic DNS Updater | |
| # | |
| # By Nathan Giesbrecht (http://nathangiesbrecht.com) | |
| # | |
| # 1) Install binary as described in no-ip.com's source file (assuming results in /usr/local/bin) | |
| # 2) Run sudo /usr/local/bin/noip2 -C to generate configuration file | |
| # 3) Copy this file noip2.service to /etc/systemd/system/ | |
| # 4) Execute `sudo systemctl daemon-reload` | |
| # 5) Execute `sudo systemctl enable noip2` | |
| # 6) Execute `sudo systemctl start noip2` |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://www.digitalocean.com/community/questions/self-hosted-ngrok-or-serveo-alternative | |
| https://www.everythingcli.org/ | |
| https://www.digitalocean.com/community/tutorials/how-to-secure-nginx-with-let-s-encrypt-on-ubuntu-18-04 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| dsquery * -filter "(&(ObjectCategory=Person)(ObjectClass=User)(!userAccountControl:1.2.840.113556.1.4.803:=262144))" -attr userPrincipalName distinguishedName description -limit 0 | |
| Get-ADGroup "Domain Admins" | Select-Object DistinguishedName | |
| Get-ADUser -LDAPfilter "(&(ObjectCategory=Person)(ObjectClass=User)(!userAccountControl:1.2.840.113556.1.4.803:=262144)(memberOf:1.2.840.113556.1.4.1941:=CN=Domain Admins,CN=Users,DC=homelab,DC=local))" | Export-Csv -Path <filename> | |
| dsquery * -filter "(&(ObjectCategory=Person)(ObjectClass=User)(!userAccountControl:1.2.840.113556.1.4.803:=262144)(memberOf:1.2.840.113556.1.4.1941:=CN=Domain Admins,CN=Users,DC=homelab,DC=local))" -attr userPrincipalName distinguishedName description -limit 0 | |
| Get-ADUser -LDAPfilter "(&(ObjectCategory=Person)(ObjectClass=User)(!userAccountControl:1.2.840.113556.1.4.803:=262144)(memberOf:1.2.840.113556.1.4.1941:=CN=Domain Admins,CN=Users,DC=homelab,DC=local))" -Properties * | Export-csv -NoTypeInformation -Path <filename> | |
| Get-ADUser -LDAPfilte |