📖
Building a Windows AD lab
  • Building a Windows AD lab
  • Lab-setup
    • Lab overview
    • Building the lab
      • Prerequisite
      • Creating images
        • Optional: Install software & Settings
      • Network setup
      • Cloning & Creating VM's
      • Creating bank.local
        • Creating Domain Controller - DC01
          • Enable RDP
        • Creating amsterdam.bank.local
          • Creating Domain Controller - DC02
            • Creating a AD structure
            • Create a CA
            • Configure LDAPS
          • Creating Fileserver - FILE01
            • File services
          • Creating W10 client - WS01
            • PSRemoting
          • Creating Webserver - WEB01
            • Web Services
            • SQL Server
              • Create database
      • Creating secure.local
        • Creating Domain Controller - DC03
        • Creating File/SQL Server - DATA01
          • SQL Server
            • Create database
    • Attack Paths
      • Attack path 1 (hard)
        • Configuring
        • Tasks
        • Manual
      • Attack path 2
        • Configuring
        • Task
        • Manual
    • Troubleshooting
    • To-Do
  • Vulnerabilities & Misconfigurations & Attacks
    • Initial Access Attacks
      • Username Enumeration
        • Password Spraying
        • AS-REP Roasting
        • Empty Password
      • SMB Relaying
      • SMB Null-Session (To-Do)
      • SQL Server default login
    • Active Directory Attacks
      • Password spraying
      • AS-REP Roasting
      • Empty password
      • Password in description
      • Kerberoasting
      • Delegation Attacks
        • Unconstrained Delegation
          • Printerbug
        • Constrained Delegation
        • Resource Based Constrained Delegation
          • Computeraccount Takeover
          • Change-LockScreen
          • Webclient Attack (todo)
      • DACL-Abuses
        • Write Owner
        • Owns
        • WriteDacl
        • GenericAll
        • GenericWrite (todo)
        • ForceChangePassword
        • Add user to group (todo)
        • Targeted Kerberoast (todo)
        • Get-Changes
      • Reused local administrator (todo)
      • SQL Server Attacks (todo)
        • Initial Access
          • SQL Server default login
          • Normal domain user access
        • Privilege Escalation
          • Impersonation
          • DB-Owner
          • Enumerate Logins
            • Weak passwords
        • Executing Commands
        • Database-Links
        • Capturing hashes & Relaying
      • Reading LAPS passwords (todo)
      • Priviliged Groups (todo)
        • DNS-Admins (todo)
        • Account Operators (todo)
        • Backup Operators
        • Server Operators (todo)
      • Hopping domains and forests
        • Child to parent domain
          • Krbtgt hash
          • Trust key
        • Cross forest Attacks (todo)
          • Foreign user
    • Misc
      • Reverse shell trick
      • Lateral Movement
        • PSRemoting
        • PsExec (todo)
      • Misconfigured Service (todo)
        • Unqouted Service Path
      • Discovering Shares
      • Password on shares
      • Different methods of dumping credentials
        • LSASS (todo)
        • Dumping DPAPI
          • Browser passwords
        • Scheduled tasks (todo)
        • Services (todo)
        • Vssadmin Shadow Copy
      • ms-ds-machineaccountquota (todo)
      • add DNS Records (todo)
      • Bypassing UAC
    • Template page
  • Defence
    • Detection
    • Hardening
      • LDAP
        • LDAP Signing
        • LDAPS Binding
      • Strong Password Policy
      • Change who can join computers to the domain
      • Protected users group
      • Account is sensitive and cannot be delegated
      • Powershell Execution Policy
      • Template page
Powered by GitBook
On this page
  • General machine info
  • Installation after sysprep
  • Renaming and setting a static IP
  • Creating a new forest
  • Installing Domain Services
  • Promoting to Domain Controller
  • Creating DNS records
  • Creating trust to bank.local
  • Enable RDP
Edit on GitHub
  1. Lab-setup
  2. Building the lab
  3. Creating secure.local

Creating Domain Controller - DC03

PreviousCreating secure.localNextCreating File/SQL Server - DATA01

Last updated 2 years ago

General machine info

  • Machine Name: DC03

  • IP Adress: 10.0.0.100

  • Subnetmask: 255.255.255.0

  • Gateway: 10.0.0.1

  • DNS: 10.0.0.100

  • Role: Domain Services

  • Domain: secure.local

Installation after sysprep

  1. Startup the machine.

  2. When asked if you copied the Virtual Machine, select "I Copied It".

3. Choose the correct settings for your lab, in our example we choose for the region "Netherlands", for app language we choose "English (United States)" and for keyboard layout "United States-International".

4. Accept the 'License terms'.

5. When asked to "Customize Settings" and set a password for the Administrator user, set the same password as before. Which was Welcome01!.

6. Press CTRL + ALT + DEL and login with the user and password we just set.

Renaming and setting a static IP

  1. Open File Explorer --> right click "This PC" --> Properties.

2. Click on "Rename this PC".

3. Fill in DC03 and click "Next".

4. When asked to restart, click on "Restart Now".

5. Login again and rightclick in the Taskbar on the Networking Icon and select "Open Network & Internet Settings".

6. Click on "Change adapter options".

7. Right click the Ethernet adapter and select "Properties".

8. Select "Internet Protocol Version 4 (TCP/IPv4) and click "Properties".

9. Copy the following settings:

10. Click on "OK" and close all the Windows.

Creating a new forest

Installing Domain Services

1. Click on start and open the "Server Manager".

2. On the right top click on "Manage" and "Add Roles and Features".

3. Check the "Skip this page by default" box and click "Next" three times (For the steps "Before You Begin", "Installation Type" and "Server Selection".

4. At the step "Server Roles" select "Active Directory Domain Services".

5. After we have selected "Active Directory Domain Services" a new window will pop-up. Within this window we click on "Add Features".

6. After "Active Directory Domain Services" is selected we click on "Next". We also click "Next" at the "Features" and "AD DS" steps.

7. At the "Confirmation" step click "Install". This can take some minutes.

8. When the installation finishes close the window.

Promoting to Domain Controller

1. In the server manager click on the flag and click on "Promote this server to a domain controller"

2. Select "Add a new forest" and fill in the domain name secure.local.

3. At the step "Domain Controller Options" set a DSRM Password. For this domain we will choose SecureRecoveryKey2022 as password.

4. For the steps "DNS Options", "Additional Options", "Paths" and "Review Options" click Next.

5. At the step "Prerequisites Check" click "Install".

6. The machine should automatically restart, if not manually restart the machine.

7. Login with the Administrator:Welcome01! credentials.

Creating DNS records

  1. Login to DC001 as the Administrator user with password Welcome01!.

  2. Open the "Server Manager", click on "Tools" and open the "DNS" tool.

3. In the DNS Server expand "DC01" and right click on "Conditional Forwarders" and click "new".

4. Add the DNS Domain secure.local with the IP 10.0.0.100 and click "OK".

If you see a cross don't worry. I takes some time to validate. You can check the properties later to check if it is validated.

5. Do the same on DC03 but then for bank.local with the IP 10.0.0.2.

Creating trust to bank.local

  1. Open the "Server Manager", click on "Tools" and then "Active Directory Domain and Trusts".

2. Right click the domain object "Secure.local" and click on "Properties".

3. Click on the tab "Trust", then click "New Trust" and then click "Next".

4. On the "Trust Name" page, type the NetBIOS name bank.local and then click "Next".

5. On the "Trust Type" page, select "External trust" and click "Next".

6. On the "Direction of trust" page select "Two-Way" and click "Next".

7. On the "Sides of Trust" page select "Both this domain and the specified Domain" and click "Next".

8. Fill in the the credentials Administrator and password Welcome01.

9. Select "Domain-wide authentication" for this trust and click "Next".

10. Select "Domain-wide authentication" for this trust and click "Next" till the page "Confirm Outgoing Trust".

11. On the page "Confirm Outgoing Trust" select "Yes, confirm the outgoing trust".

12. On the page "Confirm incoming Trust" select "Yes, confirm the incoming trust".

13. Click "Finish"

14. Close the Windows.

Enable RDP

  1. Open the Server Manager and click in the left menu on "Local Server".

  2. Click on "Disabled" in the "Remote Desktop" section

3. Then select "Allow remote connections to this computer" in the "Remote Desktop" section and click "Apply" and "Ok".

Remote Desktop is enabled.