Identify live hosts on the network before deep scanning.
Key AD ports: 53 (DNS), 88 (Kerberos), 135 (RPC), 139/445 (SMB), 389/636 (LDAP), 3268 (GC), 3389 (RDP), 5985 (WinRM).
Intercept broadcast name resolution to capture NTLMv2 hashes from machines trying to resolve hostnames.
Enumerate valid domain usernames via Kerberos pre-auth without triggering lockout.
BloodHound maps AD attack paths. SharpHound collects data; BloodHound visualizes it in Neo4j.
Find abusable ACLs: GenericAll, GenericWrite, WriteOwner, WriteDACL, ForceChangePassword.
Use captured NTLM hash to authenticate without knowing the plaintext password.
When SMB signing is disabled, relay captured NTLM auth to another host without cracking.
Request TGS tickets for SPN accounts. The ticket is encrypted with the service account's NTLM hash — crack offline.
Users with "Do not require Kerberos preauthentication" send AS-REP without auth — grab & crack.
If you have SeImpersonatePrivilege (common on service accounts, IIS, SQL), escalate to SYSTEM.
Simulate DC replication to pull all password hashes from AD. Requires DA or DCSync ACL rights (GetChanges + GetChangesAll).
With the krbtgt hash, forge a TGT for any user — valid for 10 years. Full domain persistence.
With a service account NTLM hash, forge a TGS for that service. More stealthy than Golden Ticket — no DC contact needed.
If you have DA access to the DC, extract NTDS.dit directly for offline hash extraction.