Users
Last updated
Last updated
Users
SamAccountName
: Username of the user
SID
: domain +
DistinguishedName
: used in LDAP to identify objects in an Active Directory.
NTLM
NTHash
Can be used to perform Pass-The-Hash
or Overpass-The-Hash
attacks.
LMHash
Old and discontinued from Vista/Server2008
Dumping password on modern system will show aad3b435b51404eeaad3b435b51404ee
(LMHash of empty string)
Kerberos Keys
Kerberos keys are derived from the user's password.
Algorithms
AES 256 Key: Used by AES256-CTS-HMAC-SHA1-96
algorithm (Most Used).
AES 128 Key: Used by AES128-CTS-HMAC-SHA1-96
algorithm.
DES Key: Used by DES-CBC-MD5
algorithm.
RC4 Key: NTHash of the user used by RC4-HMAC
algorithm.
A property of a User Class in AD. This property has certain flags:
ACCOUNTDISABLE
: Account is disabled and cannot be used.
DONT_REQUIRE_PREAUTH
: The account doesn't require Kerberos pre-authentication.
NOT_DELEGATED
: This account cannot be delegated through Kerberos delegation.
Description
AdminCount
MemberOf
: Groups of which the user is a member of
PrimaryGroupID
: Primary group of the user. Does not appear in MemberOf.
ServicePrincipalName
Each computer in the domain has it's own user. Users are stored in the User
class. Computers are stored in the Computer
class which a subclass of the User
class. It is stored as Hostname$
.
When trust is established with a domain, a trust user account is created which also ends with a $
symbol. The username of this account is the net-bios name of the domain. This user stores the trust key, as the NThash or kerberos keys.
TRUSTED_FOR_DELEGATION
: Kerberos Unconstrained Delegation is enabled for this account and its services. required to modify it.
TRUSTED_TO_AUTH_FOR_DELEGATION
: The Kerberos S4U2Self extension is enabled for this account and its services. required to modify it.
-> The list of services for which the user (and its own services) can impersonate clients using Kerberos Constrained Delegation. required to modify it.