Coder Social home page Coder Social logo

z3ro110 / active-directory-penetration-testing Goto Github PK

View Code? Open in Web Editor NEW

This project forked from ad-attacks/ad-attacks-by-service

0.0 0.0 0.0 68.09 MB

Active Directory Penetration Testing for Red Teams

Home Page: https://ad-attacks.com/

License: GNU General Public License v3.0

active-directory-penetration-testing's Introduction

Home | Projects | Discord | Videos | Courses | Author | Contact

Active Directory Penetration Testing

Welcome to the Active Directory Attacks Documentation for Red Teams!

This documentation serves as a comprehensive resource for understanding various attack techniques and vulnerabilities associated with Active Directory environments. Whether you are a security professional, system administrator, or simply interested in learning about cybersecurity, this documentation will provide valuable insights into the risks and countermeasures related to Active Directory attacks.

Active Directory Attacks In this documentation, you will find detailed explanations of different attack techniques employed by malicious actors to compromise Active Directory infrastructures. We cover well-known techniques such as Pass-the-Hash, Golden Ticket, Kerberoasting, and more. Each attack technique is accompanied by a description, potential impact, detection methods, and recommended mitigation strategies.

My aim is to help you understand the inner workings of these attacks, enabling you to identify vulnerabilities within your own Active Directory environment and implement effective security measures to protect against them. Additionally, we provide real-world examples and practical guidance to enhance your understanding of the attack vectors and their implications.

We encourage you to explore the various sections of this documentation, where you will find detailed explanations, step-by-step guides, and recommended best practices to secure your Active Directory infrastructure. Stay one step ahead of potential threats and bolster your organization's security posture with the knowledge gained from this documentation.

Remember, a well-informed defender is better equipped to safeguard their Active Directory environment against malicious actors. Let's dive in and strengthen our defenses against Active Directory attacks!

Happy learning and stay secure!

DigitalOcean Referral Badge

Learn Active Directory

Header 1 Header 2 Header 3
Service and Port Numbers Cell 2 Cell 3
Local Groups Cell 5 Cell 6
Domain Groups Cell 8 Cell 9
Domain Groups Cell 8 Cell 9
Domain Groups Cell 8 Cell 9
Domain Groups Cell 8 Cell 9

Windows Attack Scenarios

Scenario Description LAB design
Windows Client Cell 2 Cell 3
Windows Client with AD Cell 5 Cell 6
Windows Server Standalone Cell 8 Cell 9
Windows Server with AD Cell 8 Cell 9
Active Direcory Environment Cell 8 Cell 9
Active Direcory Multi Forest Environment Cell 8 Cell 9

Active Directory External Reconnaissance

Active Directory (AD) External Reconnaissance is a methodology used to gather information and assess the security posture of an organization's Active Directory infrastructure from an external perspective.

Active Directory Attacks Theory

Alt text

  • Initial Compromise
  • Host Reconnaissance
  • Domain Enumeration
  • Local Privilege Escalation
  • Administrator Enumeration
  • Lateral Movement
  • Domain Admin privs
  • Cross Trust Attacks
  • Domain Persistence
  • Exfiltrate

Active Directory Attacks by Service Type (Protocol)

Protocol Port Description
NetBIOS Cell 2 Cell 3
DNS 53 Cell 6
MsSQL Cell 8 Cell 9
LDAP Cell 8 Cell 9
Kerberos Cell 8 Cell 9
Samba 445 Cell 9
IIS 80 / 443 Cell 9
Exchange Cell 8 Cell 9
WinRM Cell 8 Cell 9
SCCM Cell 8 Cell 9

My Tools Arsenal Documentation

Tool Description Documentation
Nmap 25 Nmap
CrackMapExec 30 CrackMapExec
Rubeus 40 Rubeus
Certify Text Certify
Mimikatz Text Mimikatz
BloodHound Text BloodHound
DeathStar Text DeathStar
Metasploit Text Metasploit
Empire Text Empire
Covenant Text Covenant
Cobal Strike Text Cobal Strike
Tool Text Docs
Tool Text Docs
Tool Text Docs

Windows Privilege Escalation

Domain Privilege Escalation

  • Attack Privilege Requirements
  • Kerbrute Enumeration — No domain access required
  • Pass the Ticket — Access as a user to the domain required
  • Kerberoasting — Access as any user required
  • AS-REP Roasting — Access as any user required
  • Golden Ticket — Full domain compromise (Domain Admin) required
  • Silver Ticket — Service hash required
  • Skeleton Key — Full domain compromise (Domain Admin) required

NordVPN deal

AD Attacks

Attack Technique Description
Pass-the-Hash An attack where an attacker steals the hash of a user's password and uses it to authenticate and impersonate the user.
Golden Ticket A technique that allows an attacker to forge Kerberos tickets, granting them unauthorized access with domain-level privileges.
Kerberoasting Exploits the weak encryption of Kerberos ticket-granting tickets (TGTs) to extract the password hashes of Active Directory service accounts.
BloodHound A tool used to identify and exploit Active Directory trust relationships, exposing potential attack paths and lateral movement opportunities.
DCShadow An attack that manipulates domain controllers to create a rogue domain controller, allowing attackers to stealthily inject changes into the Active Directory infrastructure.
Skeleton Key A technique that allows an attacker to bypass authentication by injecting a backdoor password into Active Directory, granting them unauthorized access.
Silver Ticket Similar to a Golden Ticket, but instead of compromising the Key Distribution Center (KDC), it targets specific service principals, granting unauthorized access to specific services.

More Documentation

Certifications Guides

NordVPN deal

active-directory-penetration-testing's People

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.