Lab Overview

This advanced lab focuses on Active Directory security assessment and exploitation techniques. You'll learn to identify and exploit common misconfigurations, understand privilege escalation paths, and develop remediation strategies.

🔍 Enterprise AD Security

While this lab covers fundamental Active Directory security concepts, enterprise environments require thorough security assessments. For organizations in Portugal seeking professional Active Directory security evaluations, Pentesting.pt provides comprehensive AD security assessment and hardening services.

Learning Objectives

🎯 Lab Environment

Network Topology

  • Domain: RFS.LOCAL
  • Domain Controller: DC01.RFS.LOCAL (Windows Server 2019)
  • Member Server: SRV01.RFS.LOCAL (Windows Server 2016)
  • Workstations: WS01.RFS.LOCAL, WS02.RFS.LOCAL (Windows 10)
  • File Server: FS01.RFS.LOCAL (Windows Server 2019)
  • Network Range: 192.168.100.0/24

Deployment Options

This lab requires significant resources. We recommend deploying on a cloud platform for optimal performance:

  • 🚀 Recommended: Deploy on DigitalOcean using CPU-Optimized Droplets
  • 💻 Local Setup: 32GB RAM minimum, 8-core CPU recommended
  • 💾 Storage: 250GB+ SSD storage for optimal performance
  • 🌐 Network: Isolated VPC for secure testing

🛠️ Required Tools

Enumeration Tools

  • PowerView: AD enumeration and exploitation
  • BloodHound: Attack path analysis
  • ADRecon: Comprehensive AD information gathering
  • ldapdomaindump: LDAP enumeration

Exploitation Tools

  • Rubeus: Kerberos ticket manipulation
  • Impacket: Protocol implementations
  • Mimikatz: Credential extraction
  • PowerShell Empire: Post-exploitation

Persistence Tools

  • SharPersist: Persistence techniques
  • PowerSploit: PowerShell exploitation
  • Invoke-Obfuscation: PowerShell obfuscation
  • Custom Scripts: Tailored persistence mechanisms

📋 Lab Phases

Phase 1: Initial Reconnaissance

Enumerate the Active Directory environment and identify attack vectors.

  • Domain and forest enumeration
  • User and group discovery
  • Service Principal Name (SPN) identification
  • Trust relationship analysis

Phase 2: Initial Compromise

Exploit identified vulnerabilities to gain additional access.

  • Kerberoasting vulnerable service accounts
  • ASREPRoasting pre-authentication disabled accounts
  • Password spraying against identified users
  • Credential extraction from compromised systems

Phase 3: Lateral Movement

Move through the network using compromised credentials.

  • Pass-the-hash and over-pass-the-hash attacks
  • PowerShell remoting exploitation
  • WMI and DCOM lateral movement
  • Token impersonation techniques

Phase 4: Privilege Escalation

Escalate to Domain Administrator level access.

  • Delegation abuse (unconstrained/constrained)
  • DCSync attack against domain controller
  • Golden ticket creation and usage
  • AdminSDHolder abuse

Phase 5: Persistence & Stealth

Establish multiple persistence mechanisms.

  • Golden ticket persistence
  • Silver ticket for specific services
  • Skeleton key implementation
  • Group Policy modification

🎯 Detailed Scenarios

Scenario 1: Service Account Exploitation

Objective: Identify and exploit Kerberoastable service accounts.

Tasks

  1. Enumerate all SPNs in the domain
  2. Identify vulnerable service accounts
  3. Request TGS tickets for services
  4. Extract and crack service account passwords
  5. Verify access with compromised accounts

Key Commands

  • Get-DomainUser -SPN
  • Request-SPNTicket
  • Invoke-Kerberoast
  • hashcat -m 13100

Scenario 2: Delegation Attack Chain

Objective: Exploit delegation vulnerabilities for privilege escalation.

Tasks

  1. Identify computers with unconstrained delegation
  2. Force authentication to delegated machine
  3. Extract TGT from LSASS memory
  4. Pass-the-ticket for privilege escalation
  5. Achieve Domain Admin access

Expected Findings

  • Unconstrained delegation on SRV01
  • Forced authentication via printer bug
  • Domain Controller TGT extraction
  • Full domain compromise

Scenario 3: Golden Ticket Persistence

Objective: Create and use golden tickets for persistent access.

Tasks

  1. Extract KRBTGT account hash
  2. Identify domain SID
  3. Generate golden ticket
  4. Test persistent access
  5. Demonstrate stealth capabilities

Persistence Benefits

  • Long-term access (10 years default)
  • Bypass most detection mechanisms
  • Works even after password changes
  • Administrative access to all systems

🔍 Attack Path Analysis

BloodHound Analysis Exercise

Use BloodHound to identify and visualize attack paths to Domain Admins.

Data Collection

  1. Run SharpHound collector
  2. Import data into BloodHound
  3. Run pre-built queries
  4. Identify shortest paths to DA

Key Queries

  • Shortest Path to Domain Admins
  • Find all Kerberoastable Users
  • Find Computers with Unconstrained Delegation
  • Find ASREPRoastable Users

📊 Expected Results

Lab Completion Criteria

Successfully complete the following objectives to pass the lab:

  • 🎯 Domain Enumeration: Map the complete AD structure
  • 🔓 Service Account Compromise: Successfully crack Kerberoast hashes
  • 🚶 Lateral Movement: Access multiple domain systems
  • 👑 Domain Admin Access: Achieve highest privileges
  • 🔐 Persistence: Establish multiple backdoors
  • 📋 Documentation: Detailed attack chain report

💡 Advanced Techniques

OPSEC Considerations

  • Avoid noisy enumeration techniques
  • Use legitimate admin tools when possible
  • Implement proper timing between actions
  • Clean up artifacts after testing

Detection Evasion

  • PowerShell logging bypass
  • AMSI evasion techniques
  • ETW bypass methods
  • Living off the land approach

Alternative Attack Paths

  • Resource-based constrained delegation
  • Shadow credentials attack
  • ADCS certificate abuse
  • Group Policy modification

🎓 Knowledge Validation

Post-Lab Assessment

Answer these questions to validate your understanding:

  1. What is the difference between Kerberoasting and ASREPRoasting?
  2. How does unconstrained delegation differ from constrained delegation?
  3. What are the prerequisites for a DCSync attack?
  4. How long is a golden ticket valid by default, and can this be changed?
  5. What is the difference between a golden ticket and a silver ticket?
  6. How can AdminSDHolder be abused for persistence?
  7. What are the key indicators of compromise for each attack type?
  8. How would you defend against the attacks demonstrated in this lab?

🛡️ Defense Recommendations

Security Hardening Measures

  • 🔐 Service Accounts: Use Managed Service Accounts (MSA)
  • 🎫 Kerberos: Enable AES encryption for Kerberos
  • 👥 Privileged Groups: Minimize Domain Admin membership
  • 🖥️ Delegation: Avoid unconstrained delegation
  • 📊 Monitoring: Implement comprehensive AD logging
  • 🚨 Detection: Deploy behavioral analytics
  • 🔒 LAPS: Implement Local Administrator Password Solution
  • 🏰 Tiering: Implement administrative tier model

🎯 Lab Completion Checklist

Verify your progress: Ensure you've completed all components.

Estimated Time: 8-12 hours for complete lab

← Back to Lab Setup

Frequently Asked Questions

What is the Active Directory Lab?

A hands-on environment to practice Active Directory security, including enumeration and exploitation techniques.

What skills can I develop here?

You will learn domain enumeration, privilege escalation, and AD exploitation.

Who should use this lab?

Anyone interested in Active Directory security, penetration testing, or red teaming.

Subscribe for Cybersecurity Updates

Get the latest roadmaps, labs, and resources straight to your inbox.