📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • General machine info
  • Installation after sysprep
  • Renaming and setting a static IP
  • Creating Child Domain
  • Installing Domain Services
  • Promoting to Child Domain Controller
  • Creating extra Domain Admins
  • Creating a user
  • Adding the user to the group
  • Installing and configuring the DHCP service
  • Installing DHCP
  • Configuring DHCP
Edit on GitHub
  1. Lab-setup
  2. Building the lab
  3. Creating bank.local
  4. Creating amsterdam.bank.local

Creating Domain Controller - DC02

PreviousCreating amsterdam.bank.localNextCreating a AD structure

Last updated 3 years ago

General machine info

  • Machine Name: DC02

  • IP Adress: 10.0.0.3

  • Subnetmask: 255.255.255.0

  • Gateway: 10.0.0.1

  • DNS: 10.0.0.2

  • Role: Domain Services, DHCP, DNS

  • Domain: amsterdam.bank.local

Installation after sysprep

  1. Startup the machine.

  2. When asked if you copied the Virtual Machine, select "I Copied It".

3. Choose the correct settings for your lab, in our example we choose for the region "Netherlands", for app language we choose "English (United States)" and for keyboard layout "United States-International"

4. Accept the 'License terms'.

5. When asked to "Customize Settings" and set a password for the Administrator user, set the same password as before. Which was Welcome01!.

6. Press CTRL + ALT + DEL and login with the user and password we just set.

Renaming and setting a static IP

1. Open File Explorer --> right click "This PC" --> Properties.

2. Click on "Rename this PC".

3. Fill in DC02 and click "Next".

4. When asked to restart, click on "Restart Now".

5. Login again and rightclick in the Taskbar on the Networking Icon and select "Open Network & Internet Settings".

6. Click on "Change adapter options".

7. Right click the Ethernet adapter and select "Properties".

8. Select "Internet Protocol Version 4 (TCP/IPv4) and click "Properties".

9. Copy the following settings:

10. Click on "OK" and close all the Windows.

Creating Child Domain

Installing Domain Services

1. Click on start and open the "Server Manager".

2. On the right top click on "Manage" and "Add Roles and Features".

3. Check the "Skip this page by default" box and click "Next" three times (For the steps "Before You Begin", "Installation Type" and "Server Selection".

4. At the step "Server Roles" select "Active Directory Domain Services".

5. After we have selected "Active Directory Domain Services" a new window will pop-up. Within this window we click on "Add Features".

6. After "Active Directory Domain Services" is selected we click on "Next". We also click "Next" at the "Features" and "AD DS" steps.

7. At the "Confirmation" step click "Install". This can take some minutes.

8. When the installation finishes close the window.

Promoting to Child Domain Controller

1. In the server manager click on the flag and click on "Promote this server to a domain controller"

2. Select "Add a new domain to an existing forest". After this we choose the domain type "Child Domain". In this example our domain is called 'bank.local', so we fill this in at parent domain name. Our new domain name is going to be "amsterdam.bank.local", so fill in "amsterdam". At the last step we fill in the credentials of our parent domain. Click on "Next"

3. At the step "Domain Controller Options" set a DSRM Password. For this lab we will choose AmsterdamBankRecoveryKey2022 as password.

4. For the steps "DNS Options", "Additional Options", "Paths" and "Review Options" click Next.

5. At the step "Prerequisites Check" click "Install".

With the help of PowerShell we can confirm that our child domain is created and that we have a trust to DC01 (bank.local).

Get-ADDomain

Get-ADTrust -Identity "bank.local"

Creating extra Domain Admins

Creating a user

  1. Open the "Server Manager", click on "Tools" and then "Active Directory Users and Computers".

2. Extend the directories and click on the folder "Users". All the default users and groups are shown in this folder.

3. Right click the "Users" directory, go to "New" and click "User"

4. Fill in the following information and click on "Next".

  • First name: Amsterdam

  • Last name: admin

  • User logon name: admin_amsterdam

5. For this user we will set a password we can remember TheBestSecureBank2022. Make sure you save it somewhere, like in a password manager. And uncheck the box "user must change password at next logon"

6. Click "Next" and "Finish"

Adding the user to the group

  1. Right click the user and click on "Add to a group..."

2. Add the user to the "Domain Admins" group by typing the name into the textbox and click on "OK

3. With the following simple PowerShell command we can check if Amsterdam admin is part of the Domain Admins group.

Get-ADGroupMember "Domain Admins"

Installing and configuring the DHCP service

Installing DHCP

Since we disabled DHCP in our VMWare, we need a DHCP server to lease IP-adresses to our machines which doesn't have a static IP, such as Workstations.

  1. Click on start and open the "Server Manager".

2. On the right top click on "Manage" and "Add Roles and Features".

3. Click "Next" two times (For the steps"Installation Type" and "Server Selection".

4. At the step "Server Roles" select "DHCP Server", click "Add Features" and "Next" three times.

5. At the step "Confirmation" click "Install". Once the installation finishes click close.

6. In the server manager click on the flag and click on "Complete DHCP configuration"

7. Click "Next" and then select "User alternate credentials" and fill in the credentials for admin_bank.

Username: bank\admin_bank Password: jr8Q3o97@s37AF

8. Click on "Commit" and "close".

Configuring DHCP

  1. Click on "Tools" in the "Server Manager" and select "DHCP".

2. Unfold the directories, right click on "IPv4" and select "New Scope"

3. Click "Next", fill in the name "DHCP Clients" and click "Next".

4. At the step "IP Adress Range" fill in the following:

  • Start IP Adress: 10.0.0.128

  • End IP Adress: 10.0.0.250

  • Length: 24

  • Subnet mask: 255.255.255.0

5. At the step "Add Exclusion and Delay" and "Lease Duration" click "Next". We will leave this default.

6. At the step "Configure DHCP Options" make sure "Yes" is selected and click "Next"

7. Fill in 10.0.0.1 for the default gateway and click on "Add", it should be in the list and then click on "Next"

8. At the step "Domain Name and DNS Server" make sure 10.0.0.2 and 10.0.0.3 are listed as DNS servers.

9. At the step "WINS Servers" and "Activate Scope" click "Next".

10. Click "Finish".

11. We should now see a Scope for IPV4.

The "Change..." button window
Get-ADTrust -identity "bank.local" - from DC02