📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • Our goal
  • 0xjs
  • JustRelax
Edit on GitHub

Building a Windows AD lab

In this GitBook 0xjs and JustRelax will demonstrate how to build a vulnerable Active Directory(AD) lab for learning pentesting windows domains. Creating misconfigurations, abusing and patching them.

NextLab overview

Last updated 2 years ago

  • Always consult additional resources when performing these attacks outside of the lab

The text in this gitbook is written by and . Cloning it and presenting it as your own is illegal and strictly forbidden, don't do it.

The seperate gitbook is divided in three sections;

Lab-Setup

In this setup the initial lab setup is covered. Installing images, VM's, creating the domains etc. There also is a overview of the attack paths including tasks and a whole manual for each attack path.

Vulnerabilities & Misconfigurations & Attacks

This section will cover all the attacks currently covered documented in the lab. This section will keep on growing and growing depending on what we want to test or implement. Not all attacks will be implemented in an attack path. We might experiment or test some attacks and document them on a page.

Defence

This section will cover all the different defence and detection pages.

It doesn't cover all the recommendations for each vulnerability or page, but when something is worth covering on a seperate page and implementing it in the lab, it can be found here. Its still work in progess since we haven't decided yet if we want to make a seperate hardened domain or not and what we want to implement for a monitoring solution.

Our goal

What is a better way to learn something about an active directory (AD) then building it yourself? In this gitbook we want to learn you;

  • to build an AD;

  • how to configure vulnerabilities or misconfigurations inside your AD;

  • how to attack those vulnerabilities or misconfigurations ;

  • how to detect and defend yourself against it.

If something is missing from this gitbook or if you have questions please hit us up on github or make a 'issue' on the github page.

0xjs

JustRelax

0xjs
JustRelax
https://github.com/0xJs
https://jonyschats.nl/
https://www.linkedin.com/in/jony-schats/
https://www.linkedin.com/in/stanplasmeijer/
Page cover image