githubEdit

AD

Skill Level: Intermediate to Advanced Prerequisites: Windows internals, networking, Kerberos basics

Info

Basic Active Directory terms

Users

Agent represented by a user account.

  • Regular user accounts (used by employees or for specific task as backups)

  • Computer accounts (ends with $). Computers in AD are a users subclass.

Services

  • Identified by SPN which indicates the service name and class, the owner and the host computer.

  • Is executed in a computer (the host of the service) as a process.

  • Services (as any process) are running in the context of a user account, with the privileges and permissions of that user.

  • The SPN’s of the services owned by an user are stored in the attribute ServicePrincipalName of that account.

  • Usually Domain Admin or similar role is required to modify the SPN’s of a user.

General

Common vulns

Quick tips

Relay attacks flow

Scan

Basic attack A

Basic attack B (socks proxy)

LDAP Enum

IPv6 DNS Takeover via Mitm6

LDAP complete guide

AD Mindmap

https://orange-cyberdefense.github.io/ocd-mindmaps/img/pentest_ad_dark_2022_11.svgarrow-up-right

DACL mindmap

AD Certificate Services (ADCS) Attacks

AD CS is a common attack vector in modern AD environments. Misconfigured certificate templates can lead to domain compromise.

Enumeration

ESC1 - Template Misconfiguration

ESC4 - Vulnerable Template ACLs

ESC8 - NTLM Relay to ADCS

Shadow Credentials

UnPAC the Hash

KrbRelayUp

Last updated

Was this helpful?