Active Directory Attacks
Purpose
Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing.
Inputs/Prerequisites
-
Kali Linux or Windows attack platform
-
Domain user credentials (for most attacks)
-
Network access to Domain Controller
-
Tools: Impacket, Mimikatz, BloodHound, Rubeus, CrackMapExec
Outputs/Deliverables
-
Domain enumeration data
-
Extracted credentials and hashes
-
Kerberos tickets for impersonation
-
Domain Administrator access
-
Persistent access mechanisms
Essential Tools
Tool Purpose
BloodHound AD attack path visualization
Impacket Python AD attack tools
Mimikatz Credential extraction
Rubeus Kerberos attacks
CrackMapExec Network exploitation
PowerView AD enumeration
Responder LLMNR/NBT-NS poisoning
Core Workflow
🧠 Knowledge Modules (Fractal Skills)
-
Step 1: Kerberos Clock Sync
-
Step 2: AD Reconnaissance with BloodHound
-
Step 3: PowerView Enumeration
-
Password Spraying
-
Kerberoasting
-
AS-REP Roasting
-
DCSync Attack
-
Pass-the-Ticket (Golden Ticket)
-
Silver Ticket
-
Pass-the-Hash
-
OverPass-the-Hash
-
Responder + ntlmrelayx
-
SMB Signing Check
-
ESC1 - Misconfigured Templates
-
ESC8 - Web Enrollment Relay
-
ZeroLogon (CVE-2020-1472)
-
PrintNightmare (CVE-2021-1675)
-
samAccountName Spoofing (CVE-2021-42278/42287)
-
Example 1: Domain Compromise via Kerberoasting
-
Example 2: NTLM Relay to LDAP