Enterprises are using Microsoft Active Directory for identity management and protecting resources. As a blue or red teamer finding and exploiting flaws and understanding the underlying security issues are very important.
What you will learn
In this series of posts, you will be guided through red team oriented Active Directory attacks, enumerating, exploiting common misconfigurations and abusing Active Directory functionality to assess Active Directory security.
Some of the attack scenarios i would like to cover:
- Active Directory Enumeration
- Active Directory Enumeration with Bloodhound
- Abusing Active Directory Object Permissions
- SMB Relay Attacks
- Domain Persistence
- Abusing Microsoft LAPS
- Credential Attacks
- Kerberos Delegeation Attacks
- Unconstrained Delegation
- Constrained Delegation
- Resource based Constrained Delegeation
- Attacking Active Directory Forest
- Abusing SQL Server
I have a redteam cyber range that mimics real-world Active Directory environment for demostrating the attacks. If you are looking to setup similar lab environment there are plenty of resource available, i am not going to cover step by step lab setup in this post.
In the lab setup i have three domains.
- Forest Root
- External Trusted Domain
- Child Domain
Hardware and Software Specifications:
- Processor: i7-7700
- RAM: 32GB RAM
- HDD: 1TB SSD
- OS: Windows Server 2016, Windows Server 2012, SQL Server 2019 Dev
- Virtualization Software: VMware Workstation