top of page
Erica Zelickowski

LDAP Queries for Offensive and Defensive Operations

Updated: 7 days ago



In the age of BloodHound, many consultants have become accustomed to let this very powerful tool do much of the heavy lifting in domain enumeration. BloodHound integrates a strong visual perspective, security descriptors, inbound and outbound object controls, exploit information, OPSEC considerations, and so much more. It's as much a defensive tool as it is an offensive tool. However, some engagements may prefer consultants to take a “low and slow” approach to see what useful information can be acquired about the directory and its objects without BloodHound.


None of the queries outlined here are new or late breaking information. With the exception of a few, they’ve been acquired from multiple resources around the web as referenced below. In fact, the first LDAP RFCs date back to at least 1997 for LDAP version 3. There are numerous blogs, RFCs, and technical specifications; all explaining how to gather information from AD DS with LDAP queries.


The intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can pick their poison when deciding how to deliver them. Some delivery method examples include vbscript, powershell (i.e. adsi and adsisearcher type accelerators), dsquery, ADExplorer, AdsiEdit, javascript, win32API, .NET languages, ldapsearch, adfind, adsearch, and likely many others. Equally, defenders can use these queries to test their detection capabilities when large traffic spikes may not be produced, see what attackers will see from various perspectives within their environment, and aid to remediate domain privilege escalation and lateral movement opportunities from breach hosts.


1. Find directory information about my current user.


For example: let’s assume my user’s samaccountname is ericazelic

dsquery * -filter "(&(objectCategory=person)(objectClass=user)(samaccountname=ericazelic))" -limit 0 -attr * 

2. Find all Domain Controllers (DC):


Some tests may require two domain controllers (i.e. zerologon, NTLM downgrade relay over LDAP with authentication on second DC). Other places this information may be available is the DNS Client Cache, or klist. However, having a list of all of them may be useful.

(&(objectCategory=Computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))

3. Look for places (servers) to move laterally.


Traditional penetration tests often rely on Nessus and/or nmap scans. With LDAP enumeration, you can find all servers in the directory that are not DCs to look for information gathering, and lateral movement opportunities:

(&(objectCategory=computer)(operatingSystem=*server*)(!(userAccountControl:1.2.840.113556.1.4.803:=8192)))

4. Find certificate authorities and publishers:

(CN="Cert Publishers"*) 

5. Find all organizational units (OU) :


Different OUs may have different group policies, targeted configurations, and administrators:

(objectCategory=organizationalUnit)

VBScript example:

On Error Resume Next

Const ADS_SCOPE_SUBTREE = 2

Set objConnection = CreateObject("ADODB.Connection")
Set objCommand = CreateObject("ADODB.Command")
objConnection.Provider = "ADsDSOObject"
objConnection.Open "Active Directory Provider"
Set objCommand.ActiveConnection = objConnection

objCommand.Properties("Page Size") = 1000
objCommand.Properties("Searchscope") = 2
objCmd.Properties("Timeout") = 30
objCmd.Properties("Cache Results") = False

objCommand.CommandText = _
"SELECT Name FROM 'LDAP://DC=ad,DC=yummy,DC=tacos' WHERE objectCategory='organizationalUnit'"
Set objRecordSet = objCommand.Execute

objRecordSet.MoveFirst
Do Until objRecordSet.EOF
Wscript.Echo objRecordSet.Fields("Name").Value
objRecordSet.MoveNext
Loop

6. Find all Containers :


 Look for non-default AD containers. Sometimes organizations will have containers for shares, authentication, and other uses.

(objectCategory=container)

7. Find accounts with a serviceprincipalname (SPN):


Finding accounts with SPNs helps us identify kerberoastable accounts as well as helps us understand what services are running where in the environment. In some cases, if we have the ability to write to an object in the directory, we could add a serviceprincipalname to the object to make it kerberoastable. This query could also be used to help us confirm the serviceprincipalname was added:


DSQuery:

* -filter "(&(objectClass=User)(serviceprincipalname=*)(samaccountname=*))" -limit 0 -attr samaccountname serviceprincipalname

Powershell:

([adsisearcher]'(servicePrincipalName=*)').FindAll()

8. Constrained Delegation:


 Accounts with constrained delegation allow you to impersonate any domain user account as long as it’s not flagged with “Account is sensitive and cannot be delegated” or a member of the Protected Users group:

(&(objectClass=User)(msDS-AllowedToDelegateTo=*))

9. Unconstrained Delegation (will include DCs) :


Unless an account is marked “Account is sensitive and cannot be delegated” or a member of Protected Users group, you can coerce authentications and dump the TGT which is stored in memory and can be extracted:

(userAccountControl:1.2.840.113556.1.4.803:=524288)

10. Resource Based Constrained Delegation (RBCD):


Looking for RBCD helps us to identify targets in potential attack paths as well as allows us to check the object attribute when setting it ourselves. A discussion of RBCD is beyond the scope of this post, however, a great reference is Elad Shamir's Wagging the Dog blog post.

(msDS-AllowedToActOnBehalfOfOtherIdentity=*)

For example, if machineaccountquota is > 0, we can use powermad to add a machine account:

Using dsquery to check if the machine account was created and list the SID:

Add a raw security descriptor to the msds-allowedtoactonbehalfofotheridentity and check it was successfully added with dsquery:

Now we can use the NT hash as the RC4 key to get a Kerberos ticket and impersonate other domain users to complete the attack.

11. Accounts Not Trusted for Delegation:


If this attribute is set, accounts cannot be used in delegations discussed above.

(&(samaccountname=*)(userAccountControl:1.2.840.113556.1.4.803:=1048576))


12. Shadow Credentials:


In domains using Active Directory Certificate Service (AD CS) and a domain controller (DC) with PKINIT enabled that's 2016 or later, we may be able to modify this attribute to take over user and computer accounts. Once we have generated a certificate and written to the attribute, we can confirm the modification with this LDAP query. More about Shadow Credentials can be found here.

(msDS-KeyCredentialLink=*)

13. Kerberos Pre-Authentication Disabled:


Although rare, an account with this attribute means it is AS-REP roastable.

(&(objectCategory=person)(objectClass=user)(userAccountControl:1.2.840.113556.1.4.803:=4194304))

14. Kerberoastable Users:


This query will help us find user accounts that are kerberoastable. This means we may be able to crack the password offline and forge a silver ticket, or use the credentials alone to move laterally.

(&(objectClass=user)(servicePrincipalName=*)(!(cn=krbtgt))(!(samaccounttype=805306369)))

15. Members of a group through nesting:


Many directories will have users that are not direct members of a group but have the group's privileges due to nesting.

(memberOf:1.2.840.113556.1.4.1941:=cn=Test,ou=East,dc=Domain,dc=com)

16. Users Not Required to Have a Password:


This helps us find opportunities for lateral movement. According to Microsoft, even if a password is required by group policy (GP), this setting will override the GP.

(&(objectCategory=person)(objectClass=user)(userAccountControl:1.2.840.113556.1.4.803:=32))


17. Groups:


This enables you to view all the groups in the directory and identify groups that may have administrative permissions as possible targets, additional information about the technology stack, and other useful information about the environment.

(objectCategory=group)

18. Protected Users Group:


Members of this group can only sign on using Kerberos. If an account is in the Protected Users group, delegations and NTLM pass-the-hash attacks will not work. Also, DES or RC4 encryption types in Kerberos pre-authentication will fail, Kerberos TGTs cannot be renewed beyond their initial 4 hour period, and passwords will not be cached.

(&(objectCategory=CN=group,CN=Schema,CN=configuration,DC=yourDomainName,DC=yourDomainExtension)(samaccountname=Protect*)(member=*))


19. User Objects With Description:


The description attributes of user directory objects sometimes contain passwords or additional useful information about users.

(&(objectCategory=user)(description=*))

20. Computer Objects With Description:


The description attribute of computer objects sometimes reveals additional information about the system and its purpose that may not be derived from the NetBIOS name.

(&(objectCategory=computer)(description=*))

21. Passwords Don’t Expire:


Accounts with old passwords may be more vulnerable. For example, we could look at breach information and create more precise lists for low and slow brute force attacks (not ideal) ensuring we don't lockout users.

(&(objectCategory=person)(objectClass=user)(userAccountControl:1.2.840.113556.1.4.803:=65536))

22. User Must Change Password on Next Login:


Some organizations may use a scripted password when doing password changes. Suppose we find that password on a share with Snaffler. We may be able to use tools like smbpasswd or rpcclient to change it from Linux. This is probably a bad idea to do on a penetration test without asking the client first. It's generally a bad idea to change users' passwords unless you have the ability to change them back before they notice and have permission from the client when consulting.


As for the pwdlastset=0 attribute, according to Microsoft, there are 3 occurrences you may see this attribute set to zero:

  • Where an account has been created but a password has not been assigned.

  • Where an account has been created and the administrator has assigned a password but selected the option to change password at next logon.

  • Where the administrator has selected the option to require a user to change their password at the next logon as part of managing that user’s account, such as after a password reset.

(&(objectCategory=person)(objectClass=user)(pwdLastSet=0)(!(useraccountcontrol:1.2.840.113556.1.4.803:=2)))

23. User Objects with Elevated Domain Rights:


Usually, if an object has this attribute set, it is part of a protected group with elevated domain privileges, or once was. Examples of security groups where this attribute is known to enable domain privilege escalation include backup operators, account operators, server operators, print operators, domain admins, enterprise admins, schema admins, dnsadmins, and sometimes read-only domain controllers. If an account is a member of one of these groups, either directly or indirectly, we can gain control of the domain. Knowing which directory objects have this attribute set helps us create a list of targets. It's not unusual to see kerberoastable service accounts with this attribute value although passwords for service accounts have become harder to crack offline in recent years due to stronger passwords on high value service accounts.

(&(objectClass=user)(admincount=1)(!(samaccountname=krbtgt))(!(samaccountname=administrator)))

24. User Accounts with SID History:


Accounts with SIDHistory may have access in other domains.

(&(objectCategory=Person)(objectClass=User)(sidHistory=*))

25. Generate a List of User Accounts samaccountname:

(&(objectCategory=Person)(objectClass=User)(samaccountname=*))

26. Generate a list of computer object names:

(&(objectClass=Computer)(samaccountname=*))

 

Polito Inc. offers a wide range of security consulting services including threat hunting, penetration testing, vulnerability assessments, red teaming engagements, incident response, digital forensics, and more. If your business or your clients have any cyber security needs, contact our experts and experience what Masterful Cyber Security is all about.


Phone: 571-969-7039

Website: politoinc.com

 

CHANGELOG:

First publication: 07/05/2023

Updated #26 from NetBIOS to computer object: 07/06/2023

REFERENCES:

CONTACT US

Let’s Work Together

10565 Fairfax Blvd Suite 201, Fairfax, VA 22030

info@politoinc.com

Tel: 571-969-7039

  • LinkedIn
  • Facebook
  • Twitter

Thanks for submitting!

© 2024 by Polito, Inc. All rights reserved. Privacy Policy.

bottom of page