Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

84 total results found

Managing Users

Red Team - Windows Active Directory - Basics

Your first task as the new domain administrator is to check the existing AD OUs and users, as some recent changes have happened to the business. You have been given the following organisational chart and are expected to make changes to the AD to match it: D...

Managing Computers

Red Team - Windows Active Directory - Basics

By default, all the machines that join a domain (except for the DCs) will be put in the container called "Computers". If we check our DC, we will see that some devices are already there: We can see some servers, some laptops and some PCs corresponding to th...

Group Policies

Red Team - Windows Active Directory - Basics

So far, we have organised users and computers in OUs just for the sake of it, but the main idea behind this is to be able to deploy different policies for each OU individually. That way, we can push different configurations and security baselines to users depe...

Authentication Methods

Red Team - Windows Active Directory - Basics

When using Windows domains, all credentials are stored in the Domain Controllers. Whenever a user tries to authenticate to a service using domain credentials, the service will need to ask the Domain Controller to verify if they are correct. Two protocols can b...

Trees, Forests and Trusts

Red Team - Windows Active Directory - Basics

So far, we have discussed how to manage a single domain, the role of a Domain Controller and how it joins computers, servers and users. As companies grow, so do their networks. Having a single domain for a company is good enough to start, but in time some a...

OSINT & Phishing

Red Team - Windows Active Directory - Breaching

Two popular methods for gaining access to that first set of AD credentials is Open Source Intelligence (OSINT) and Phishing. We will only briefly mention the two methods here, as they are already covered more in-depth in other rooms. OSINT OSINT is used to d...

NTLM Authenticated Services

Red Team - Windows Active Directory - Breaching

NTLM and NetNTLM New Technology LAN Manager (NTLM) is the suite of security protocols used to authenticate users' identities in AD. NTLM can be used for authentication by using a challenge-response-based scheme called NetNTLM. This authentication mechanism is...

LDAP Bind Credentials

Red Team - Windows Active Directory - Breaching

LDAP Another method of AD authentication that applications can use is Lightweight Directory Access Protocol (LDAP) authentication. LDAP authentication is similar to NTLM authentication. However, with LDAP authentication, the application directly verifies the ...

Authentication Relays

Red Team - Windows Active Directory - Breaching

Continuing with attacks that can be staged from our rogue device, we will now look at attacks against broader network authentication protocols. In Windows networks, there are a significant amount of services talking to each other, allowing users to make use of...

Microsoft Deployment Toolkit (MDT)

Red Team - Windows Active Directory - Breaching

Large organisations need tools to deploy and manage the infrastructure of the estate. In massive organisations, you can't have your IT personnel using DVDs or even USB Flash drives running around installing software on every single machine. Luckily, Microsoft ...

Configuration Files

Red Team - Windows Active Directory - Breaching

The last enumeration avenue we will explore in this network is configuration files. Suppose you were lucky enough to cause a breach that gave you access to a host on the organisation's network. In that case, configuration files are an excellent avenue to explo...

Credential Injection

Red Team - Windows Active Directory - Enumeration

Before jumping into AD objects and enumeration, let's first talk about credential injection methods. From the Breaching AD network, you would have seen that credentials are often found without compromising a domain-joined machine. Specific enumeration techniqu...

Microsoft Management Console

Red Team - Windows Active Directory - Enumeration

You should have completed the Active Directory Basics room by now, where different AD objects were initially introduced. In this task, it will be assumed that you understand what these objects are. Connect to THMJMP1 using RDP and your provisioned credentials ...

Enumeration through Command Prompt

Red Team - Windows Active Directory - Enumeration

Command Prompt There are times when you just need to perform a quick and dirty AD lookup, and Command Prompt has your back. Good ol' reliable CMD is handy when you perhaps don't have RDP access to a system, defenders are monitoring for PowerShell use, and you...

Enumeration through PowerShell

Red Team - Windows Active Directory - Enumeration

PowerShell PowerShell is the upgrade of Command Prompt. Microsoft first released it in 2006. While PowerShell has all the standard functionality Command Prompt provides, it also provides access to cmdlets (pronounced command-lets), which are .NET classes to p...

BloodHound

Red Team - Windows Active Directory - Enumeration

Lastly, we will look at performing AD enumeration using Bloodhound. Bloodhound is the most powerful AD enumeration tool to date, and when it was released in 2016, it changed the AD enumeration landscape forever. Bloodhound History For a significant amount of...

Conclusion

Red Team - Windows Active Directory - Enumeration

Enumerating AD is a massive task. Proper AD enumeration is required to better understand the structure of the domain and determine attack paths that can be leveraged to perform privilege escalation or lateral movement. Additional Enumeration Techniques In th...

Conclusion

Red Team - Windows Active Directory - Breaching

A significant amount of attack avenues can be followed to breach AD. We covered some of those commonly seen being used during a red team exercise in this network. Due to the sheer size of the attack surface, new avenues to recover that first set of AD credenti...

Moving Through the Network

Red Team - Windows Active Directory - Lateral Movement and...

What is Lateral Movement? Simply put, lateral movement is the group of techniques used by attackers to move around a network. Once an attacker has gained access to the first machine of a network, moving is essential for many reasons, including the following: ...

Spawning Processes Remotely

Red Team - Windows Active Directory - Lateral Movement and...

This task will look at the available methods an attacker has to spawn a process remotely, allowing them to run commands on machines where they have valid credentials. Each of the techniques discussed uses slightly different ways to achieve the same purpose, an...