Skip to main content

Recently Updated Pages

Exploiting Certificates

Red Team - Windows Active Directory - Exploiting

Now that we have access to THMSERVER2, we have furthered our journey of exploiting AD by exploiti...

Updated 2 weeks ago by Arthur Reppelin

Exploiting GPOs

Red Team - Windows Active Directory - Exploiting

Keylogging the user allowed us to decrypt their credential database, providing us with credential...

Updated 2 weeks ago by Arthur Reppelin

Exploiting Automated Relays

Red Team - Windows Active Directory - Exploiting

In this task we will take a look at some automated relays. Authentication attempts are constantly...

Updated 2 weeks ago by Arthur Reppelin

Exploiting Permission Delegation

Red Team - Windows Active Directory - Exploiting

Active Directory can delegate permissions and privileges through a feature called Permission Dele...

Updated 2 weeks ago by Arthur Reppelin

Port Forwarding

Red Team - Windows Active Directory - Lateral Movement and...

Most of the lateral movement techniques we have presented require specific ports to be available ...

Updated 2 weeks ago by Arthur Reppelin

Abusing User Behaviour

Red Team - Windows Active Directory - Lateral Movement and...

Under certain circumstances, an attacker can take advantage of actions performed by users to gain...

Updated 2 weeks ago by Arthur Reppelin

Use of Alternate Authentication Material

Red Team - Windows Active Directory - Lateral Movement and...

By alternate authentication material, we refer to any piece of data that can be used to access a ...

Updated 2 weeks ago by Arthur Reppelin

Spawning Processes Remotely

Red Team - Windows Active Directory - Lateral Movement and...

This task will look at the available methods an attacker has to spawn a process remotely, allowin...

Updated 2 weeks ago by Arthur Reppelin

Moving Through the Network

Red Team - Windows Active Directory - Lateral Movement and...

What is Lateral Movement? Simply put, lateral movement is the group of techniques used by attack...

Updated 2 weeks ago by Arthur Reppelin

BloodHound

Red Team - Windows Active Directory - Enumeration

Lastly, we will look at performing AD enumeration using Bloodhound. Bloodhound is the most powerf...

Updated 2 weeks ago by Arthur Reppelin

Microsoft Management Console

Red Team - Windows Active Directory - Enumeration

You should have completed the Active Directory Basics room by now, where different AD objects wer...

Updated 2 weeks ago by Arthur Reppelin

Configuration Files

Red Team - Windows Active Directory - Breaching

The last enumeration avenue we will explore in this network is configuration files. Suppose you w...

Updated 2 weeks ago by Arthur Reppelin

Microsoft Deployment Toolkit (MDT)

Red Team - Windows Active Directory - Breaching

Large organisations need tools to deploy and manage the infrastructure of the estate. In massive ...

Updated 2 weeks ago by Arthur Reppelin

Authentication Relays

Red Team - Windows Active Directory - Breaching

Continuing with attacks that can be staged from our rogue device, we will now look at attacks aga...

Updated 2 weeks ago by Arthur Reppelin

LDAP Bind Credentials

Red Team - Windows Active Directory - Breaching

LDAP Another method of AD authentication that applications can use is Lightweight Directory Acce...

Updated 2 weeks ago by Arthur Reppelin

NTLM Authenticated Services

Red Team - Windows Active Directory - Breaching

NTLM and NetNTLM New Technology LAN Manager (NTLM) is the suite of security protocols used to au...

Updated 2 weeks ago by Arthur Reppelin

Trees, Forests and Trusts

Red Team - Windows Active Directory - Basics

So far, we have discussed how to manage a single domain, the role of a Domain Controller and how ...

Updated 2 weeks ago by Arthur Reppelin

Authentication Methods

Red Team - Windows Active Directory - Basics

When using Windows domains, all credentials are stored in the Domain Controllers. Whenever a user...

Updated 2 weeks ago by Arthur Reppelin

Group Policies

Red Team - Windows Active Directory - Basics

So far, we have organised users and computers in OUs just for the sake of it, but the main idea b...

Updated 2 weeks ago by Arthur Reppelin

Managing Computers

Red Team - Windows Active Directory - Basics

By default, all the machines that join a domain (except for the DCs) will be put in the container...

Updated 2 weeks ago by Arthur Reppelin