Lab Overview

This advanced lab simulates a real-world Active Directory environment where you'll perform a complete domain compromise. Starting with limited access to a domain-joined machine, your objective is to escalate privileges, move laterally through the network, and achieve Domain Administrator access while maintaining persistence.

Learning Objectives

๐ŸŽฏ Lab Environment

Network Topology

  • Domain: RFS.LOCAL
  • Domain Controller: DC01.RFS.LOCAL (Windows Server 2019)
  • Member Server: SRV01.RFS.LOCAL (Windows Server 2016)
  • Workstations: WS01.RFS.LOCAL, WS02.RFS.LOCAL (Windows 10)
  • File Server: FS01.RFS.LOCAL (Windows Server 2019)
  • Network Range: 192.168.100.0/24

๐Ÿ› ๏ธ Required Tools

Enumeration Tools

  • PowerView: AD enumeration and exploitation
  • BloodHound: Attack path analysis
  • ADRecon: Comprehensive AD information gathering
  • ldapdomaindump: LDAP enumeration

Exploitation Tools

  • Rubeus: Kerberos ticket manipulation
  • Impacket: Protocol implementations
  • Mimikatz: Credential extraction
  • PowerShell Empire: Post-exploitation

Persistence Tools

  • SharPersist: Persistence techniques
  • PowerSploit: PowerShell exploitation
  • Invoke-Obfuscation: PowerShell obfuscation
  • Custom Scripts: Tailored persistence mechanisms

๐Ÿ“‹ Lab Phases

Phase 1: Initial Reconnaissance

Enumerate the Active Directory environment and identify attack vectors.

  • Domain and forest enumeration
  • User and group discovery
  • Service Principal Name (SPN) identification
  • Trust relationship analysis

Phase 2: Initial Compromise

Exploit identified vulnerabilities to gain additional access.

  • Kerberoasting vulnerable service accounts
  • ASREPRoasting pre-authentication disabled accounts
  • Password spraying against identified users
  • Credential extraction from compromised systems

Phase 3: Lateral Movement

Move through the network using compromised credentials.

  • Pass-the-hash and over-pass-the-hash attacks
  • PowerShell remoting exploitation
  • WMI and DCOM lateral movement
  • Token impersonation techniques

Phase 4: Privilege Escalation

Escalate to Domain Administrator level access.

  • Delegation abuse (unconstrained/constrained)
  • DCSync attack against domain controller
  • Golden ticket creation and usage
  • AdminSDHolder abuse

Phase 5: Persistence & Stealth

Establish multiple persistence mechanisms.

  • Golden ticket persistence
  • Silver ticket for specific services
  • Skeleton key implementation
  • Group Policy modification

๐ŸŽฏ Detailed Scenarios

Scenario 1: Service Account Exploitation

Objective: Identify and exploit Kerberoastable service accounts.

Tasks

  1. Enumerate all SPNs in the domain
  2. Identify vulnerable service accounts
  3. Request TGS tickets for services
  4. Extract and crack service account passwords
  5. Verify access with compromised accounts

Key Commands

  • Get-DomainUser -SPN
  • Request-SPNTicket
  • Invoke-Kerberoast
  • hashcat -m 13100

Scenario 2: Delegation Attack Chain

Objective: Exploit delegation vulnerabilities for privilege escalation.

Tasks

  1. Identify computers with unconstrained delegation
  2. Force authentication to delegated machine
  3. Extract TGT from LSASS memory
  4. Pass-the-ticket for privilege escalation
  5. Achieve Domain Admin access

Expected Findings

  • Unconstrained delegation on SRV01
  • Forced authentication via printer bug
  • Domain Controller TGT extraction
  • Full domain compromise

Scenario 3: Golden Ticket Persistence

Objective: Create and use golden tickets for persistent access.

Tasks

  1. Extract KRBTGT account hash
  2. Identify domain SID
  3. Generate golden ticket
  4. Test persistent access
  5. Demonstrate stealth capabilities

Persistence Benefits

  • Long-term access (10 years default)
  • Bypass most detection mechanisms
  • Works even after password changes
  • Administrative access to all systems

๐Ÿ” Attack Path Analysis

BloodHound Analysis Exercise

Use BloodHound to identify and visualize attack paths to Domain Admins.

Data Collection

  1. Run SharpHound collector
  2. Import data into BloodHound
  3. Run pre-built queries
  4. Identify shortest paths to DA

Key Queries

  • Shortest Path to Domain Admins
  • Find all Kerberoastable Users
  • Find Computers with Unconstrained Delegation
  • Find ASREPRoastable Users

๐Ÿ“Š Expected Results

Lab Completion Criteria

Successfully complete the following objectives to pass the lab:

  • ๐ŸŽฏ Domain Enumeration: Map the complete AD structure
  • ๐Ÿ”“ Service Account Compromise: Successfully crack Kerberoast hashes
  • ๐Ÿšถ Lateral Movement: Access multiple domain systems
  • ๐Ÿ‘‘ Domain Admin Access: Achieve highest privileges
  • ๐Ÿ” Persistence: Establish multiple backdoors
  • ๐Ÿ“‹ Documentation: Detailed attack chain report

๐Ÿ’ก Advanced Techniques

OPSEC Considerations

  • Avoid noisy enumeration techniques
  • Use legitimate admin tools when possible
  • Implement proper timing between actions
  • Clean up artifacts after testing

Detection Evasion

  • PowerShell logging bypass
  • AMSI evasion techniques
  • ETW bypass methods
  • Living off the land approach

Alternative Attack Paths

  • Resource-based constrained delegation
  • Shadow credentials attack
  • ADCS certificate abuse
  • Group Policy modification

๐ŸŽ“ Knowledge Validation

Post-Lab Assessment

Answer these questions to validate your understanding:

  1. What is the difference between Kerberoasting and ASREPRoasting?
  2. How does unconstrained delegation differ from constrained delegation?
  3. What are the prerequisites for a DCSync attack?
  4. How long is a golden ticket valid by default, and can this be changed?
  5. What is the difference between a golden ticket and a silver ticket?
  6. How can AdminSDHolder be abused for persistence?
  7. What are the key indicators of compromise for each attack type?
  8. How would you defend against the attacks demonstrated in this lab?

๐Ÿ›ก๏ธ Defense Recommendations

Security Hardening Measures

  • ๐Ÿ” Service Accounts: Use Managed Service Accounts (MSA)
  • ๐ŸŽซ Kerberos: Enable AES encryption for Kerberos
  • ๐Ÿ‘ฅ Privileged Groups: Minimize Domain Admin membership
  • ๐Ÿ–ฅ๏ธ Delegation: Avoid unconstrained delegation
  • ๐Ÿ“Š Monitoring: Implement comprehensive AD logging
  • ๐Ÿšจ Detection: Deploy behavioral analytics
  • ๐Ÿ”’ LAPS: Implement Local Administrator Password Solution
  • ๐Ÿฐ Tiering: Implement administrative tier model

๐ŸŽฏ Lab Completion Checklist

Verify your progress: Ensure you've completed all components.

Estimated Time: 8-12 hours for complete lab

๐Ÿ“ง Stay Updated with New Roadmaps

Get notified when we add new cybersecurity roadmaps and expert content!

โ† Back to Lab Setup