<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SYSVOL &#8211; @Forensicxs</title>
	<atom:link href="https://www.forensicxs.com/tag/sysvol/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.forensicxs.com</link>
	<description>Ethical Hacking &#124; Cybersecurity</description>
	<lastBuildDate>Sat, 23 Jan 2021 21:30:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Active Directory Hacking Lab</title>
		<link>https://www.forensicxs.com/active-directory-hacking-lab/</link>
					<comments>https://www.forensicxs.com/active-directory-hacking-lab/#respond</comments>
		
		<dc:creator><![CDATA[Forensicxs]]></dc:creator>
		<pubDate>Sat, 23 Jan 2021 21:30:16 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Bloodhound]]></category>
		<category><![CDATA[CrackMapExec]]></category>
		<category><![CDATA[Domain Controller]]></category>
		<category><![CDATA[Dump]]></category>
		<category><![CDATA[GPO]]></category>
		<category><![CDATA[Hacking Lab]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[lsass]]></category>
		<category><![CDATA[lsassy]]></category>
		<category><![CDATA[Mimikatz]]></category>
		<category><![CDATA[NTDS.DIT]]></category>
		<category><![CDATA[Powersploit]]></category>
		<category><![CDATA[Pypykatz]]></category>
		<category><![CDATA[Sysinternals]]></category>
		<category><![CDATA[SYSVOL]]></category>
		<guid isPermaLink="false">https://www.forensicxs.com/?p=1333</guid>

					<description><![CDATA[In this article, I&#8217;m going to create a simulated, Active Directory Hacking Lab, and then assess some methods to uncover Active Directory &#8220;secrets&#8221; In fact, Active Directory &#8211; AD &#8211; is a key component to manage Entreprise wide networks. It is frequently reaching a high degree of complexity in Companies, who have thousands of workstations, &#8230; <p class="link-more"><a href="https://www.forensicxs.com/active-directory-hacking-lab/" class="more-link">Continue reading<span class="screen-reader-text"> "Active Directory Hacking Lab"</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>In this article, I&#8217;m going to create a simulated, <strong><span class="has-inline-color has-vivid-red-color">Active Directory Hacking Lab</span></strong>, and then assess some methods to uncover Active Directory &#8220;secrets&#8221;</p>



<p>In fact, <strong><span class="has-inline-color has-vivid-red-color">Active Directory &#8211; AD &#8211;</span></strong> is a key component to manage Entreprise wide networks. It is frequently reaching a high degree of complexity in Companies, who have thousands of workstations, servers, and devices to manage. This complexity brings Security risks</p>



<p>Because it is a high profile target, Active Directory is therefore often attacked. Several tools have been developed to achieve this goal</p>



<p>As it is not OK to attack a real Active Directory, I will therefore create a simplified Hacking Lab, and then check different methods to explore the AD</p>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Active Directory basics</span></strong></p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="880" height="300" src="https://www.forensicxs.com/wp-content/uploads/2021/01/annuaire-Active-Directory.jpg" alt="" class="wp-image-1337" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/annuaire-Active-Directory.jpg 880w, https://www.forensicxs.com/wp-content/uploads/2021/01/annuaire-Active-Directory-300x102.jpg 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/annuaire-Active-Directory-768x262.jpg 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>There are many good resources available out there, to discover the basics of AD. I suggest this one : <a href="https://bit.ly/3877fAw" target="_blank" rel="noreferrer noopener">https://bit.ly/3877fAw</a>, and also this one : <a href="https://bit.ly/38cgnEd" target="_blank" rel="noreferrer noopener">https://bit.ly/38cgnEd</a></p>



<p>So, I will not go into details. In a nutshell, bear in mind the four main components of an AD</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Component</th><th>Definition</th></tr></thead><tbody><tr><td><strong>Domain, Forest, Tree, Objects</strong></td><td>An&nbsp;Active Directory <strong><span class="has-inline-color has-vivid-red-color">Domain</span></strong>&nbsp;is a collection of objects within a Microsoft&nbsp;Active Directory&nbsp;network<br><br>An <strong><span class="has-inline-color has-vivid-red-color">Object</span></strong> can be a single user or a group or it can be a hardware component, such as a computer or printer<br><br>The Active Directory framework that holds the objects can be viewed as a number of levels<br><br>The forest, tree, and domain are the logical divisions in an Active Directory network<br></td></tr><tr><td><strong>Directory Services</strong></td><td>Active Directory is a database that organizes your company&#8217;s&nbsp;users&nbsp;and computers<br><br>It provides a&nbsp;<strong><span class="has-inline-color has-vivid-red-color">Data Store</span></strong>&nbsp;for storage of directory data and a <strong><span class="has-inline-color has-vivid-red-color">Directory Service</span></strong>&nbsp;with an <strong><span class="has-inline-color has-vivid-red-color">LDAP</span></strong>&nbsp;Directory Service Interface<br><br>The Active Directory database is stored in C:\Windows\NTDS\<span class="has-inline-color has-vivid-red-color"><strong>NTDS</strong>.<strong>DIT</strong></span><br></td></tr><tr><td><strong>Access Rights Managements</strong></td><td>When a user logs into a computer that is part of a Windows domain,&nbsp;Active Directory&nbsp;checks the submitted password against a <strong><span class="has-inline-color has-vivid-red-color">Hash</span></strong> signature, and determines whether the user is a system administrator or a normal user<br><br>A <strong><span class="has-inline-color has-vivid-red-color">Domain Controller</span></strong> is a&nbsp;server&nbsp;on the network that centrally manages access for&nbsp;users, PCs and servers on the network, via the Active Directory configuration<br><br><strong><span class="has-inline-color has-vivid-red-color">Kerberos</span></strong>&nbsp;is used to manage credentials securely (authentication) while&nbsp;LDAP&nbsp;is used for holding authoritative information about the accounts, such as what they&#8217;re allowed to access (authorization), the user&#8217;s full name and UID<br></td></tr><tr><td><strong>Group Policy Object</strong></td><td>Microsoft&#8217;s&nbsp;<span class="has-inline-color has-vivid-red-color"><strong>Group Policy Object</strong>&nbsp;(<strong>GPO</strong>)</span> is a collection of&nbsp;Group Policy&nbsp;settings that defines what a system will look like and how it will behave for a defined&nbsp;group&nbsp;of users<br><br><strong><span class="has-inline-color has-vivid-red-color">SYSVOL</span></strong>&nbsp;is a folder that exists on all domain controllers. It is the repository for all of the active directory files. It stores all the important elements of the Active Directory group policy<br><br>A <strong><span class="has-inline-color has-vivid-red-color">File Replication Service (FRS)</span> </strong>allows the replication of the&nbsp;SYSVOL&nbsp;folder among domain controllers<br></td></tr></tbody></table></figure>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Implementation of the Active Directory Hacking Lab</span></strong></p>



<p><strong><span class="has-inline-color has-vivid-red-color">Architecture</span></strong> <strong><span class="has-inline-color has-vivid-red-color">&amp; Installation</span></strong></p>



<p>I&#8217;m going to implement the following architecture, using Virtual Machines (I use Oracle <strong><span class="has-inline-color has-vivid-red-color">VirtualBox</span></strong> as Hypervisor)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="580" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-2-1024x580.png" alt="" class="wp-image-1345" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-2-1024x580.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-2-300x170.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-2-768x435.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-2.png 1428w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The attacker will be using <strong><span class="has-inline-color has-vivid-red-color">Kali Linux</span></strong>. The &#8220;network&#8221; to attack is made of an Active Directory Domain Controller, implemented on <strong><span class="has-inline-color has-vivid-red-color">Windows Server 2016 Essentials</span></strong>, and a Workstation implemented on <strong><span class="has-inline-color has-vivid-red-color">Windows 10 Enterprise</span></strong></p>



<p>To proceed with the installation of each VM, I downloaded the ISO files of each OS &#8211; Microsoft provides evaluation versions &#8211; and initialized each VM. Here is a YouTube video to help you proceed with the installation if needed (example : Windows 10)</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Windows 10 - Installation in Virtualbox" width="525" height="295" src="https://www.youtube.com/embed/NGJqhSdytWs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>You will need to adjust the RAM memory allocated to each VM, and make sure this does not overshoot the RAM of your PC. Make sure to keep enough memory margin, to avoid saturating your PC, and face heavy performance losses or even crashes</p>



<p>After installation, I grouped the VMs in the Group &#8220;Active Directory Hacking Lab&#8221; </p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="349" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-6-1024x349.png" alt="" class="wp-image-1349" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-6-1024x349.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-6-300x102.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-6-768x262.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-6-1536x524.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-6.png 1912w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Here are the three VMs, all fired up, after installation :</p>



<figure class="wp-block-image size-large"><img decoding="async" width="605" height="325" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-3.png" alt="" class="wp-image-1346" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-3.png 605w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-3-300x161.png 300w" sizes="(max-width: 605px) 100vw, 605px" /></figure>



<p>Here below some parameters I defined during the installation, which are of interest for the next steps</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Machine</th><th>Credentials</th><th>Role</th><th>Server</th></tr></thead><tbody><tr><td>Windows Server 2016</td><td>Admin#01<br>Passwd#01</td><td>User</td><td>SVRHO01<br>HACKERONE</td></tr><tr><td>Windows Server 2016</td><td>Administrator<br>Passwd01</td><td>Admin</td><td>SVRHO01<br>HACKERONE</td></tr><tr><td>Windows 10</td><td>Bob<br>Passwd#02</td><td>User</td><td>see above</td></tr></tbody></table></figure>



<p>Our Domain is configured as follows. During the installation of Windows Server, I also promoted this machine as <strong><span class="has-inline-color has-vivid-red-color">Domain Controller</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="460" height="241" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-22.png" alt="" class="wp-image-1378" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-22.png 460w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-22-300x157.png 300w" sizes="(max-width: 460px) 100vw, 460px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Configuration of the Network</span></strong></p>



<p>Now, let&#8217;s make sure that each VM can talk to each other, and can also access Internet. For this, close down the VMs and go in the parameters of each individual VM. Then open the Network tab. You shall select, for each VM, the &#8220;Bridged Adapter&#8221;</p>



<figure class="wp-block-image size-large"><img decoding="async" width="638" height="520" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-9.png" alt="" class="wp-image-1358" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-9.png 638w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-9-300x245.png 300w" sizes="(max-width: 638px) 100vw, 638px" /></figure>



<p>This will make sure that each VM is accessible in the local network and identified with a unique IP adress. VirtualBox will allocate the IP adresses of each VMs, for you</p>



<p>For further detailed overview of each network options and the way each VM will communicate to each other, here is a good summary</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="486" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-13-1024x486.png" alt="" class="wp-image-1364" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-13-1024x486.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-13-300x142.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-13-768x364.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-13.png 1408w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption><br>Source : https://bit.ly/3sc4t53</figcaption></figure>



<p>After doing this, you can restart each VMs, and discover the IP allocations, and ping each VM with the others, to check that your VMs network is working</p>



<p>In Kali Linux, open the <strong><span class="has-inline-color has-vivid-red-color">Terminal</span></strong>, and type &#8220;<strong><span class="has-inline-color has-vivid-red-color">ip addr show</span></strong>&#8220;, then use the <strong><span class="has-inline-color has-vivid-red-color">ping</span></strong> command</p>



<p>In the Windows VMs, open <strong><span class="has-inline-color has-vivid-red-color">Powershell</span></strong>, and type &#8220;<strong><span class="has-inline-color has-vivid-red-color">ipconfig</span></strong>&#8220;, then use the ping command</p>



<p>Here is a summary of the IP adresses allocated by VirtualBox in my Lab</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Virtual Machine</th><th>IP allocation</th></tr></thead><tbody><tr><td>Kali Linux</td><td>192.168.1.45</td></tr><tr><td>Windows 10 Enterprise</td><td>192.168.1.44</td></tr><tr><td>Windows Server 2016 Essentials</td><td>192.168.1.46</td></tr></tbody></table><figcaption>IP location of each VM in the local network</figcaption></figure>



<p>Kali Linux (ping the Windows Server VM in this screen)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="827" height="479" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-10.png" alt="" class="wp-image-1360" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-10.png 827w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-10-300x174.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-10-768x445.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Windows 10 Enterprise (ping the Windows Server VM in this screen)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-12.png" alt="" class="wp-image-1362" width="424" height="320" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-12.png 499w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-12-300x227.png 300w" sizes="(max-width: 424px) 100vw, 424px" /></figure>



<p>Windows Server 2016 (ping back the Kali Linux VM in this screen)</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-11.png" alt="" class="wp-image-1361" width="427" height="392" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-11.png 478w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-11-300x276.png 300w" sizes="(max-width: 427px) 100vw, 427px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Shared Folders</span></strong></p>



<p>To share files easily between each VM and your Host PC, you shall install shared folders in each VM. The necessary steps are different between Windows VMs and Linux VMs</p>



<p>For Windows, follow these steps : <a href="https://bit.ly/35uTxWn" target="_blank" rel="noreferrer noopener">https://bit.ly/35uTxWn</a></p>



<p>For Linux, on the menu bar, go to Devices &gt;Insert Guest Additions CD Image (as done on the Windows VMs). Then, open your file explorer. You will see that a virtual CD drive has been mounted with the following content</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="172" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-15-1024x172.png" alt="" class="wp-image-1367" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-15-1024x172.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-15-300x50.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-15-768x129.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-15-1536x258.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-15.png 1698w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Open the Terminal, and follow these steps to run the installer</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-16.png" alt="" class="wp-image-1368" width="518" height="306" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-16.png 666w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-16-300x177.png 300w" sizes="(max-width: 518px) 100vw, 518px" /></figure>



<p>You should get the following messages</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-17.png" alt="" class="wp-image-1369" width="505" height="181" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-17.png 644w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-17-300x107.png 300w" sizes="(max-width: 505px) 100vw, 505px" /></figure>



<p>Then, restart the VM, open the Terminal and check that the installation is successfull, as follows</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-18.png" alt="" class="wp-image-1370" width="285" height="32" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-18.png 335w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-18-300x34.png 300w" sizes="(max-width: 285px) 100vw, 285px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Implementation of Active Directory</span></strong></p>



<p>Now, let&#8217;s proceed with the installation of a basic Active Directory structure. Let&#8217;s open the VM Windows Server 2016 and launch the  Server Manager</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1004" height="742" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-20.png" alt="" class="wp-image-1374" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-20.png 1004w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-20-300x222.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-20-768x568.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Follow this sequence : Add roles and features -&gt; Next (take care of the warnings and proceed with the necessary configurations before moving on) -&gt; Role-based or feature-based installation -&gt; Select a server from the server pool (choose the available server creared during the installation of Windows Server 2016) -&gt; Active Directory Domain Services -&gt; Next</p>



<figure class="wp-block-image size-large"><img decoding="async" width="999" height="667" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-21.png" alt="" class="wp-image-1376" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-21.png 999w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-21-300x200.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-21-768x513.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Now, let&#8217;s create objects inside our Active Directory. For this, right click on the Domain, click New, and choose the object you want to create</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="549" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-23-1024x549.png" alt="" class="wp-image-1379" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-23-1024x549.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-23-300x161.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-23-768x412.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-23.png 1435w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<hr class="wp-block-separator"/>



<p>I created a basic corporate organization and user names, as follows</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Organization</th><th>User</th><th>Password</th><th>Job title</th></tr></thead><tbody><tr><td class="has-text-align-left" data-align="left">HACKERONE-SOC</td><td>Bob Sinclair</td><td>Test1234</td><td>Analyst</td></tr><tr><td class="has-text-align-left" data-align="left">HACKERONE-SOC</td><td>Mike Delphino</td><td>Test5678</td><td>Manager</td></tr><tr><td class="has-text-align-left" data-align="left">HACKERONE-CERT</td><td>Annie Delord</td><td>Klom987</td><td>Analyst</td></tr><tr><td class="has-text-align-left" data-align="left">HACKERONE-CERT</td><td>Nicolette Phraser</td><td>Klom654</td><td>Manager</td></tr><tr><td class="has-text-align-left" data-align="left">HACKERONE-AUDIT</td><td>Luc Canama</td><td>468Oklm</td><td>Lead Auditor</td></tr><tr><td class="has-text-align-left" data-align="left">HACKERONE-AUDIT</td><td>Paulina Harter</td><td>248Grey</td><td>Manager</td></tr></tbody></table></figure>



<p>Then, we link our Windows 10 Workstation in our Domain : Windows Settings -&gt; System -&gt; About -&gt; Join a domain -&gt; Type in the domain name and User name/Password</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-24.png" alt="" class="wp-image-1385" width="512" height="250" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-24.png 788w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-24-300x147.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-24-768x375.png 768w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Discovering the Active Directory</span></strong></p>



<p>Now let&#8217;s explore some key components of Active Directory, using mimikatz. First of all, you need to know the process lsass</p>



<p><strong><span class="has-inline-color has-vivid-red-color">lsass.exe</span></strong></p>



<p>This process is the Local Security Authority Subsystem Service. It is an essential part of any Windows device. It has a key role during authentification, whatever its nature. As soon as a user logs in, authentification informations are sent to the process lsass. Inside this process, authentification management services, so called SSP &#8211; Security Service Provider, are here to manage every different type of authentifications</p>



<figure class="wp-block-image size-large"><img decoding="async" width="985" height="439" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-27.png" alt="" class="wp-image-1389" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-27.png 985w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-27-300x134.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-27-768x342.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>It is possible to dump the content of lsass, just right clicking on the process lsass in the Task Manager</p>



<figure class="wp-block-image size-large"><img decoding="async" width="665" height="590" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-28.png" alt="" class="wp-image-1391" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-28.png 665w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-28-300x266.png 300w" sizes="(max-width: 665px) 100vw, 665px" /></figure>



<p>Here is a good blog post documenting the different possible ways to dump the content of lsass : <a href="https://bit.ly/3bTwCs1" target="_blank" rel="noreferrer noopener">https://bit.ly/3bTwCs1</a></p>



<p><strong><span class="has-inline-color has-vivid-red-color">Windows hashes</span></strong></p>



<p>The passwords stored in Windows are Hashed. Here is a very good explanation about password hashes in Windows</p>



<figure class="wp-block-image size-large"><img decoding="async" width="647" height="684" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-34.png" alt="" class="wp-image-1398" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-34.png 647w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-34-284x300.png 284w" sizes="(max-width: 647px) 100vw, 647px" /><figcaption>Source : DarthSidious</figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">Windows Authentification</span></strong></p>



<p>Here is a summary of Windows authentification mechanisms between AD level and local level, and what could be extracted</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Active Directory authentification</span></strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>NTDS.DIT</strong><br>Credentials of the accounts in the Domain ( hashes LM:NTLM)<br></td><td><strong>Group Policy Preferences</strong><br>Local Administration passwords<br><br></td><td><strong>Kerberos</strong><br>Silver and Golden Tickets to be cracked<br><br></td></tr></tbody></table></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Local authentification</span></strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>SAM</strong><br>Credentials of the local accounts / hashes LM:NTLM<br><br></td><td><strong>MS-Cache</strong><br>Sessions of the latest connected users / hashes to be cracked<br></td><td><strong>Secrets LSA</strong><br>Credentials linked to services<br></td></tr><tr><td><strong>SSP</strong><br>Reversible passwords until Windows Server 2012<br><br></td><td><strong>Credential Manager</strong><br>Credentials in the web browsers or other targets in the network<br></td><td><strong>Access Token</strong><br>Delegation tokens from an interactive connexion on the machine<br></td></tr><tr><td><strong>DPAPI</strong><br>Credentials WiFi, VPN,&#8230;from the master keys<br></td><td><strong>Miscellaneous Services</strong><br>Passwords saved (FileZilla, WinSCP,&#8230;) or reversibles (VNC)<br></td><td></td></tr></tbody></table></figure>



<p>Here is also a good flowchart about identification mechanisms inside Windows</p>



<figure class="wp-block-image size-large"><img decoding="async" width="802" height="823" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-37.png" alt="" class="wp-image-1401" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-37.png 802w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-37-292x300.png 292w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-37-768x788.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /><figcaption>Source : hackingarticles.in </figcaption></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">mimikatz</span></strong></p>



<p>Now, let&#8217;s run mimikatz. The installation is easy but Windows Defender is going to treat this as a virus. In fact, this hacking tool is very efficient, but so famous now, that its signature is blocked by all main antivirus programs. I deactivated Defender for this exercise. For the installation, just download the zip from here : <a href="https://github.com/gentilkiwi/mimikatz/releases" target="_blank" rel="noreferrer noopener">https://github.com/gentilkiwi/mimikatz/releases</a></p>



<p>The lsass dump has to be in the same directory as mimikatz</p>



<figure class="wp-block-image size-large"><img decoding="async" width="590" height="114" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-35.png" alt="" class="wp-image-1399" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-35.png 590w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-35-300x58.png 300w" sizes="(max-width: 590px) 100vw, 590px" /></figure>



<p>You shall run the mimikatz.exe as administrator. We can get password hashes, Kerberos tickets, and more, using the below commands</p>



<p><strong>sekurlsa :: logonPasswords</strong> </p>



<p>Lists all available login credentials. This usually shows recently logged on user and computer credentials</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-29.png" alt="" class="wp-image-1393" width="498" height="626" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-29.png 606w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-29-239x300.png 239w" sizes="(max-width: 498px) 100vw, 498px" /></figure>



<p><strong>sekurlsa :: tickets / export</strong></p>



<p>Lists all available Kerberos tickets for all recently authenticated users, including services running under the context of a user account and the local computer’s AD</p>



<p>sekurlsa uses memory reading and can access tickets of others sessions (users)</p>



<figure class="wp-block-image size-large"><img decoding="async" width="867" height="899" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-31.png" alt="" class="wp-image-1395" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-31.png 867w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-31-289x300.png 289w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-31-768x796.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong>lsadump :: lsa /patch</strong></p>



<p>Ask LSA server to retrieve SAM/AD. Use to dump all Active Directory domain credentials from a Domain Controller or lsass.dmp dump file</p>



<p>Often these accounts are members of Domain Admins (or equivalent) or a Domain Admin was recently logged on to the computer an attacker dump credentials from. Using these credentials, an attacker can gain access to a Domain Controller and get all domain credentials, including the KRBTGT account NTLM hash which is used to create Kerberos Tickets</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-33.png" alt="" class="wp-image-1397" width="467" height="603" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-33.png 596w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-33-232x300.png 232w" sizes="(max-width: 467px) 100vw, 467px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">hashcat</span></strong></p>



<p>From all this, we can now crack the hashes and read the passwords in clear. There is a good built in Kali Linux facility for this : <span class="has-inline-color has-black-color">hashcat</span> -&gt; <a href="https://hashcat.net/wiki/doku.php?id=hashcat" target="_blank" rel="noreferrer noopener">https://hashcat.net/wiki/doku.php?id=hashcat</a></p>



<p>Here is an example with the Active Directory user declared above &#8220;Bob Sinclair&#8221; -&gt; we find &#8211; very quickly, less than 1 second ! &#8211; the password &#8220;Test1234&#8221;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-38.png" alt="" class="wp-image-1404" width="373" height="133" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-38.png 456w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-38-300x107.png 300w" sizes="(max-width: 373px) 100vw, 373px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">lsassy</span></strong></p>



<p>mimikatz is being detected by Windows Defender and almost all popular anti-virus. Lsassy has been implemented with stealth in mind. It has the following characteristics :</p>



<ul class="wp-block-list"><li>dump lsass remotely, using default Windows tools such as WMI</li><li>analyze lsass dumps remotely, without downloading the whole dump</li></ul>



<p>Here is a basic way to extract secrets by using lsassy, demonstrating its capability</p>



<figure class="wp-block-image size-large"><img decoding="async" width="835" height="625" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-48.png" alt="" class="wp-image-1419" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-48.png 835w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-48-300x225.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-48-768x575.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>In the example below, we can recover the LM:NTLM hash. This is not spectacular but shows the potential of lsassy</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-47.png" alt="" class="wp-image-1418" width="826" height="56" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-47.png 946w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-47-300x21.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-47-768x53.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">bloodhound</span></strong></p>



<p>This tool allows to map the Active Directory in a graphical manner, which is very usefull as soon as your AD gets complex. This facility also allows to track the compromized machines in the network and therefore plot the progress of an attacker</p>



<p>At first, let&#8217;s install bloodhound on my Kali Linux machine, and launch the neo4j console</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-56.png" alt="" class="wp-image-1427" width="791" height="521" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-56.png 986w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-56-300x198.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-56-768x506.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The launch of neo4j triggers the events below and launches the event listener on the localhost:7474</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-55-1024x352.png" alt="" class="wp-image-1426" width="790" height="271" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-55-1024x352.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-55-300x103.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-55-768x264.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-55.png 1136w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Once the listener is active, you need to open a web page and configure neo4j to listen on the localhost</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-58-1024x621.png" alt="" class="wp-image-1429" width="591" height="358" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-58-1024x621.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-58-300x182.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-58-768x466.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-58.png 1314w" sizes="(max-width: 591px) 100vw, 591px" /></figure>



<p>Once this is done, you need to dump the Active Directory objects from the Windows Machine, in this case Windows Server 2016, using a module called SharpHound.exe</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-57-1024x343.png" alt="" class="wp-image-1428" width="854" height="285" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-57-1024x343.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-57-300x100.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-57-768x257.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-57-1536x514.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-57.png 1778w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Then, it is easy to dump the objects and transfer them back to Kali Linux, for analysis in bloodhound. Then, we can generate a bunch of different graphs and analysis</p>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Find Shortest Paths to Domain Admins</span></strong></p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="503" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-54-1024x503.png" alt="" class="wp-image-1425" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-54-1024x503.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-54-300x147.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-54-768x378.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-54-1536x755.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-54.png 1918w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-luminous-vivid-orange-color">Shortest Paths from Domain Users to High Value Targets</span></strong></p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-53-1024x532.png" alt="" class="wp-image-1424" width="864" height="449" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-53-1024x532.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-53-300x156.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-53-768x399.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-53-1536x798.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-53.png 1810w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Additionallly, we can gather many details about our Domain Controller</p>



<figure class="wp-block-image size-large"><img decoding="async" width="938" height="836" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-59.png" alt="" class="wp-image-1430" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-59.png 938w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-59-300x267.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-59-768x684.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>This is definitely a tool to master to reckon an Active Directory</p>



<p><strong><span class="has-inline-color has-vivid-red-color">PowerSploit</span></strong></p>



<p>It is a tool used to recover some informations from the Active Directory and more actions such as persistence, based upon Windows Powershell. Attackers are using PowerSploit, including some commands in their exploitation scripts</p>



<p>For the purpose of this article, I have just installed PowerSploit inside the Windows Server machine, to discover the main functions. For installation, check this good video</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Power Sploit: How To Install on Windows Computer" width="525" height="295" src="https://www.youtube.com/embed/6TYWVYWY9TY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>Here below, we can see all the modules are installed inside System32</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-79.png" alt="" class="wp-image-1453" width="477" height="228" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-79.png 615w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-79-300x143.png 300w" sizes="(max-width: 477px) 100vw, 477px" /></figure>



<p>Now, let&#8217;s make sure the PowerSploit module is imported inside the PowerShell ISE</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-80-1024x460.png" alt="" class="wp-image-1454" width="905" height="405" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-80-300x135.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-80-768x345.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>Now, we can start some basic reconnaissance of the Domain HACKERONE.local</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-83-1024x349.png" alt="" class="wp-image-1458" width="902" height="306" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-83-1024x349.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-83-300x102.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-83-768x261.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-83.png 1378w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>PowerSploit allows you to search for &#8220;interesting&#8221; files, using some keywords or other search criteria. For example, I use the keyword &#8220;Admin&#8221;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-84.png" alt="" class="wp-image-1459" width="704" height="617" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-84.png 876w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-84-300x263.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-84-768x674.png 768w" sizes="(max-width: 704px) 100vw, 704px" /></figure>



<p>We can identify the logged users</p>



<figure class="wp-block-image size-large"><img decoding="async" width="557" height="740" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-86.png" alt="" class="wp-image-1461" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-86.png 557w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-86-226x300.png 226w" sizes="(max-width: 557px) 100vw, 557px" /></figure>



<p>We can also get a bunch of interesting informations about the users of our Domain</p>



<figure class="wp-block-image size-large"><img decoding="async" width="731" height="482" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-85.png" alt="" class="wp-image-1460" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-85.png 731w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-85-300x198.png 300w" sizes="(max-width: 731px) 100vw, 731px" /></figure>



<p>Overall, PowerSploit is rather good to extract some key informations about our Domain</p>



<p><strong><span class="has-inline-color has-vivid-red-color">Ping Castle</span></strong></p>



<p>This tool allows to get an overview of the safety situation of your Active Directory. Installation is made directly on the Windows Server 2016. There is an .EXE file that launches some scripts. We have to choose between several options</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-60-1024x326.png" alt="" class="wp-image-1432" width="796" height="253" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-60-1024x326.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-60-300x96.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-60-768x245.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-60.png 1139w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>The data collection is started and done fairly quickly</p>



<figure class="wp-block-image size-large"><img decoding="async" width="881" height="691" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-61.png" alt="" class="wp-image-1433" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-61.png 881w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-61-300x235.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-61-768x602.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We get a PDF report with some KPI and rankings, providing an overall rating</p>



<figure class="wp-block-image size-large"><img decoding="async" width="731" height="840" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-67.png" alt="" class="wp-image-1439" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-67.png 731w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-67-261x300.png 261w" sizes="(max-width: 731px) 100vw, 731px" /></figure>



<p>We also get a much detailed report about configuration issues and potential remediations</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="427" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-66-1024x427.png" alt="" class="wp-image-1438" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-66-1024x427.png 1024w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-66-300x125.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-66-768x320.png 768w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-66-1536x640.png 1536w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-66.png 1552w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p>We also get some further details about our administrator accounts</p>



<figure class="wp-block-image size-large"><img decoding="async" width="808" height="128" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-68.png" alt="" class="wp-image-1440" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-68.png 808w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-68-300x48.png 300w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-68-768x122.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></figure>



<p><strong><span class="has-inline-color has-vivid-red-color">CrackMapExec</span></strong></p>



<p>This Python framework is very modular, and allows to automate a number of tasks to collect dumps on several machines. Installation is pretty straightforward</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-43.png" alt="" class="wp-image-1414" width="470" height="91" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-43.png 589w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-43-300x58.png 300w" sizes="(max-width: 470px) 100vw, 470px" /></figure>



<p>Here below all the available modules. We can see some tooling to inject shellcode, mimikatz in Python, lsassy as seen above, some scripts similar to PowerSploit to dump the AD, integration with bloodhound,&#8230;</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://www.forensicxs.com/wp-content/uploads/2021/01/image-46.png" alt="" class="wp-image-1417" width="566" height="550" srcset="https://www.forensicxs.com/wp-content/uploads/2021/01/image-46.png 693w, https://www.forensicxs.com/wp-content/uploads/2021/01/image-46-300x292.png 300w" sizes="(max-width: 566px) 100vw, 566px" /></figure>



<hr class="wp-block-separator"/>



<p><strong><span class="has-inline-color has-vivid-cyan-blue-color">Conclusion</span></strong></p>



<p>We have learned to setup a basic Active Directory Hacking Lab and local network, with communications made possible between Kali Linux, Windows Server 2016, Windows 10 machines. We have configured a basic Active Directory infrastructure, and explored its objects with several hacking tools, either based upon C, C#, Java, Python, PowerShell</p>



<p>We have seen that Active Directory configuration is a complex topic and that the AD is really the backbone of any Windows based network. This complexity brings some significant risks. It is quite astonishing to see all the informations that can be recovered with the available hacking tools. However, I want to say that my Lab lacks some realism and I just scratched the surface of the network exploration, as most of the tools I used were detected by Windows Defender and I could not go through all the manipulations I had planned for initially</p>



<p>In any case, it is a very good way to understand Windows network infrastructure !</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.forensicxs.com/active-directory-hacking-lab/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Database Caching 1/50 queries in 0.026 seconds using Disk

Served from: www.forensicxs.com @ 2026-01-09 21:06:16 by W3 Total Cache
-->