📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • General machine info
  • Installation after sysprep
  • Renaming and setting a static IP
  • Creating the Domain
  • Installing Domain Services
  • Promoting to Domain Controller
  • Creating a Enterprise Admin
  • Creating a user
  • Adding the user to the group
Edit on GitHub
  1. Lab-setup
  2. Building the lab
  3. Creating bank.local

Creating Domain Controller - DC01

PreviousCreating bank.localNextEnable RDP

Last updated 3 years ago

General machine info

  • Machine Name: DC01

  • IP Adress: 10.0.0.2

  • Subnetmask: 255.255.255.0

  • Gateway: 10.0.0.1

  • DNS: 10.0.0.2

  • Role: Domain Services

  • Domain: bank.local

Installation after sysprep

  1. Startup the machine.

  2. When asked if you copied the Virtual Machine, select "I Copied It".

3. Choose the correct settings for your lab, in our example we choose for the region "Netherlands", for app language we choose "English (United States)" and for keyboard layout "United States-International".

4. Accept the 'License terms'.

5. During the initial startup we have to set the Administrator password again. We wil use Welcome01! for now.

6. Press CTRL + ALT + DEL and login with the user and password we just set.

Renaming and setting a static IP

1. Open File Explorer --> right click "This PC" --> Properties.

2. Click on "Change settings"

3. Click "Change" and fill in DC01 and click OK.

4. When asked to restart, click on "Restart Now"

5. Login again and rightclick in the Taskbar on the Networking Icon and select "Open Network & Internet Settings"

6. Click on "Change adapter options"

7. Right click the Ethernet adapter and select "Properties".

8. Select "Internet Protocol Version 4 (TCP/IPv4) and click "Properties"

9. Copy the following settings:

10. Click on "OK" and close all the Windows.

Creating the Domain

Installing Domain Services

  1. Click on start and open the "Server Manager".

2. On the right top click on "Manage" and "Add Roles and Features".

3. Check the "Skip this page by default" box and click "Next" three times (For the steps "Before You Begin", "Installation Type" and "Server Selection".

4. At the step "Server Roles" select "Active Directory Domain Services" and click "Next".

5. At the steps "Features" and "AD DS" click Next and click Install.

6. When the installation finishes close the window.

Promoting to Domain Controller

  1. In the server manager click on the flag and click on "Promote this server to a domain controller"

2. Select "Add a new forest" and choose a domain name.

3. At the step "Domain Controller Options" set a DSRM Password. For this lab we will choose BankRecoveryKey2022 as password.

4. For the steps "DNS Options", "Additional Options", "Paths" and "Review Options" click Next.

5. At the step "Prerequisites Check" click "Install".

6. The machine should automatically restart, if not manually restart the machine.

7. Login with the Administrator:Welcome01! credentials set during the installation.

Creating a Enterprise Admin

Creating a user

  1. Open the "Server Manager", click on "Tools" and then "Active Directory Users and Computers".

2. Extend the directories and click on the folder "Users". All the default users and groups are shown in this folder.

3. Right click the "Users" directory, go to "New" and click "User"

4. Fill in the following information and click on "Next".

  • First name: bank

  • Last name: admin

  • User logon name: admin_bank

5. For this user we will set a random password or use jr8Q3o97@s37AF. Make sure you save it somewhere, like in a password manager. And uncheck the box "user must change password at next logon"

6. Click "Next" and "Finish"

Adding the user to the group

  1. Right click the user and click on "Add to a group..."

2. Add the user to the "Enterprise Admins" group by typing the name into the textbox and click on "OK"

3. Right click on the user, click "Properties" and go to the "Member Of" tab. The Enterprise Admins groups should be shown there: