Preview Mode Links will not work in preview mode

7 Minute Security

Feb 7, 2023

Today we continue part 2 of a series we started a few weeks ago all about building a vulnerable pentesting lab. Check out the video above, and here are the main snippets of code and tips to get you going:

  • Use Youzer to import a bunch of bogus users into your Active Directory:
 sudo python ./ --generate --generate_length 20 --ou "ou=Contractors,dc=brifly,dc=us" --domain --users 1000 --output lusers.csv 
  • Make a Kerberoastable user:
 New-AdUser -Name "Kerba Roastable" -GivenName "Kerba" -Surname "Roastable" -SamAccountName Kerba -Description "ROASTED!" -Path "OU=Contractors,DC=brifly,DC=us" -AccountPassword (ConvertTo-SecureString "Password1" -AsPlainText -force) -passThru -PasswordNeverExpires $true enable-adaccount Kerba setspn -a IIS_SITE/ briflyus\kerba