bdurham.dev
githubCTFslinkedIn
  • /home
  • ℹ️/about
    • Work Experience
    • Education
    • Certifications
  • 📚Library
    • Books
    • Podcasts
  • 🔬R&D
    • Soon
  • 🪦Old Projects
    • Nominal
    • Nanoparser
    • Intel NUC Proxmox & Linode Homelab
    • Active Directory Exploitation & Pivoting Lab
    • TCM-Sec's Windows WiFi Extractor
    • Rust Basics
    • CTF Writeups
    • Paratrooper
    • DinoDisplay
    • sqlcheck.py
Powered by GitBook
On this page
  • About
  • Postmortem
  1. Old Projects

Active Directory Exploitation & Pivoting Lab

Attacking AD in a virtualized environment

About

  • Utilized VMWare Workstation Pro to setup an Active Directory environment to learn and practice AD enumeration, exploitation, and pivoting techniques.

  • Setup a domain controller with group policy objects to emulate a real life, insecure Windows environment.

  • Setup two vulnerable host machines and joined them to the AD domain.

  • Used a Kali attack box to enumerate the AD environment, intercept and spoof NTLM traffic, and practice Kerberoasting and other common AD attack methods to compromise each host in the domain, as well as the domain controller.

Postmortem

  • A great, if time consuming, way to learn not just offensive security but AD admin skills.

  • Protip: these 'about' sections are all pulled from the content of my previous site, and you can definitely tell I was writing for recruiters when I wrote this.

PreviousIntel NUC Proxmox & Linode HomelabNextTCM-Sec's Windows WiFi Extractor

Last updated 1 year ago

🪦