Active Directory Pentest Course-10
Active Directory Pentest Course-10
Date: 17/06/2025
Executive Summary
This red team assessment simulated an internal threat actor targe�ng the Ac�ve Directory
environment of ignite.local. The engagement iden�fied mul�ple vulnerabili�es that enabled lateral
movement and privilege escala�on, culmina�ng in full Domain Administrator access. These included
misconfigura�ons related to Kerberos authen�ca�on, weak password hygiene, excessive privileges,
and ineffec�ve monitoring.
1. AS-REP Roas�ng was used to extract encrypted Kerberos TGT hashes from accounts without pre-
authen�ca�on enabled.
2. Offline Password Cracking revealed valid user creden�als.
3. Ac�ve Directory Enumera�on uncovered misconfigured ACLs.
4. Abuse of Password Reset Privileges enabled access to another user account.
5. Privilege Escala�on via Backup Operators allowed extrac�on of the Administrator account hash.
6. Remote Access as Domain Admin was achieved using Evil-WinRM.
Technique ID Description
Account Discovery T1033 Enumerated domain users and groups
AS-REP Roasting T1558.004 Retrieved TGT hashes for offline
cracking
Password Cracking T1110.002 Used John the Ripper to recover
plaintext credentials
Account Manipulation T1098 Abused ACL to reset user password
Valid Accounts T1078 Used legitimate credentials to log in
OS Credential Dumping T1003.003 Extracted NTLM hash of Administrator
(NTDS)
Remote Services (WinRM) T1021.006 Used Evil-WinRM for remote execution
as Administrator
RedTeam Assessment Report
Detection Opportunities
Activity Source Event ID / Artifact Detection Strategy
AS-REP Roasting Kerberos Logs Unusual AS-REQ Monitor for AS-REQ without pre-
traffic auth
Password Reset via Security Logs Event ID 4723 Detect non-admin users
ACL performing password resets
NTDS.dit / SYSTEM File Access Logs 5145 or Sysmon Monitor access to critical files like
access FileCreate SAM/NTDS.dit
Detec�on Logic:
AS-REP Roas�ng targets Kerberos accounts that do not require pre-authen�ca�on. Atackers use
tools such as GetNPUsers.py to request AS-REQs that return encrypted creden�als which can be
cracked offline.
Key Indicators:
yaml
CopyEdit
event.code: 4768 AND
winlog.event_data.TicketEncryptionType: "0x17" AND
NOT winlog.event_data.PreAuthType: *
Mi�ga�on/Detec�on Strategy:
• Alert on AS-REQs for users with Do not require Kerberos pre-authen�ca�on enabled.
RedTeam Assessment Report
• Implement anomaly detec�on for spikes in 4768 logs with RC4 encryp�on.
Detec�on Logic:
While password cracking is performed offline and does not generate logs on the domain controller,
prior access to creden�al material (e.g., AS-REP hashes) can be monitored.
Mi�ga�on/Detec�on Strategy:
Detec�on Logic:
BloodHound uses LDAP enumera�on to query large sets of AD objects (sessions, ACLs, groups). Non-
administra�ve users genera�ng such queries is anomalous.
Key Indicators:
Sigma-style Example:
yaml
CopyEdit
event.code: 1644 AND
ldap.operation: "SearchRequest" AND
ldap.objectCount > 1000 AND
source.user.name NOT IN ["Domain Admins", "Service Accounts"]
Mi�ga�on/Detec�on Strategy:
Detec�on Logic:
Atackers can use ACL misconfigura�ons (e.g., GenericAll, ResetPassword) to manipulate accounts
and reset passwords without needing the original creden�als.
Key Indicators:
yaml
CopyEdit
event.code: 4724 AND
winlog.event_data.SubjectUserName NOT IN ["Helpdesk", "ITAdmin"] AND
winlog.event_data.TargetUserName: "raj"
Mi�ga�on:
Detec�on Logic:
The Backup Operators group allows reading sensi�ve files (e.g., NTDS.dit, SAM). This can be abused
to extract hashes or registry hives.
Key Indicators:
yaml
CopyEdit
event.code: 4663 AND
winlog.event_data.ObjectName IN ["C:\\Windows\\NTDS\\ntds.dit",
"C:\\Windows\\System32\\config\\SAM"]
RedTeam Assessment Report
Detec�on Logic:
Evil-WinRM establishes WinRM sessions over port 5985/5986. Successful logons by previously non-
privileged accounts using NTLM hashes is a red flag.
Key Indicators:
• WinRM/WSMan-related commands
yaml
CopyEdit
event.code: 4624 AND
winlog.event_data.LogonType: 3 AND
winlog.event_data.TargetUserName: "administrator"
Mi�ga�on:
• Limit use of WinRM and monitor logs for elevated access via NTLM.
Recommendations
Identity & Authentication
- Enforce Kerberos pre-authen�ca�on for all user accounts.
- Review and apply strong password policies.
- Implement MFA for administra�ve accounts wherever feasible.
Privilege Management
- Audit and limit delegated permissions using tools like BloodHound.
- Remove users from Backup Operators group unless strictly required.
Infrastructure Hardening
- Implement Local Administrator Password Solu�on (LAPS).
- Restrict and monitor usage of WinRM and other remote management interfaces.
- Regularly review group memberships and ACLs using automated tools.
Appendix
Cracked User Creden�als:
- komal : Password
- raj : Password
Conclusion
This assessment successfully demonstrated how a combina�on of weak authen�ca�on se�ngs, over-
permissive ACLs, and poor privilege management could lead to a complete Ac�ve Directory domain
compromise. The issues discovered highlight cri�cal gaps in hardening and monitoring prac�ces that
must be addressed to improve the organiza�on’s overall security posture.
JOIN OUR
TRAINING PROGRAMS
H ERE
CLICK BEGINNER
Network Pentest
Wireless Pentest
ADVANCED
Advanced CTF
Android Pentest Metasploit
EXPERT
Privilege Escalation
APT’s - MITRE Attack Tactics
Windows
Active Directory Attack
Linux
MSSQL Security Assessment
www.ignitetechnologies.in