ADExplorer - how to list a domain when antivirus disagrees
Share
In today's installment we are going to be talking about how to list a domain when the antivirus does not agree.
During a security audit, enumerating the domain is a crucial task to obtain a complete view of the corporate domain infrastructure, for which collection tools such as SharpHound or PowerView are used. However, these tools are often detected and blocked by antivirus and other security measures in place. Furthermore, given the time constraints typical of an audit, it is not always possible to successfully evade these defenses to perform the desired enumeration.
In these cases, the need arises to look for alternatives that are not only effective, but also discreet. An excellent alternative is ADExplorer.exe , a tool provided by Sysinternals and signed by Microsoft. Being signed by a recognized entity such as Microsoft, ADExplorer is generally considered non-malicious and is therefore less likely to be blocked by antiviruses.
However, if an attacker is exploiting tools like ADExplorer. There may be an occasion where the LDAP query may contain objectClass=* or objectGuid=*. This is not necessarily ideal because, depending on the size of the organization, this could contain a large amount of data to recover and could disrupt communications between a C2 and the workstation the agent is running on.
Starting from having a domain user, ADExplorer allows you to inspect the domain and take a snapshot of the Active Directory in a .dat file. Although this snapshot does not contain as much detailed information as a full extraction performed by SharpHound (no sessions are enumerated, does not provide an attack path, etc.), it is still a very useful starting point for domain enumeration.