Active Directory Attack

Active Directory (AD) remains the backbone of enterprise identity management, and consequently, the highest-value target in most internal penetration tests and red team engagements. A single misconfiguration — a stale ACL, an over-permissioned service account, a forgotten GPP password — can unravel an entire domain.

This series breaks down every major AD attack vector into practical, reference-style cheatsheets. Whether you’re preparing for CRTP, CRTO, OSCP, or running a real engagement, bookmark these.


The AD Kill Chain

Most AD compromises follow a predictable pattern:

Initial Access → Enumeration → Privilege Escalation → Lateral Movement → Persistence → Domain Admin
PhaseGoalKey Techniques
Initial AccessGet a foothold (domain user)Phishing, password spraying, LLMNR/NBT-NS poisoning
EnumerationMap the domainBloodHound, PowerView, LDAP queries
Privilege EscalationElevate to higher-privilege accountACL abuse, Kerberoasting, delegation attacks
Lateral MovementMove to other machinesPass-the-Hash, NTLM relay, WinRM, PSExec
PersistenceSurvive password resets / remediationGolden Ticket, certificates, DCShadow
Domain DominanceFull control of the forestDCSync, Enterprise Admin via trust abuse

Core Toolset

These tools appear throughout every section of this series. Install and familiarize yourself with them before diving in.

Enumeration & Visualization

ToolLanguagePurpose
BloodHoundJS/Neo4jGraph-based AD attack path discovery
SharpHound / bloodhound-pythonC# / PythonBloodHound data collectors
PowerViewPowerShellAD enumeration framework
ADModulePowerShellMicrosoft-signed AD enumeration

Exploitation

ToolLanguagePurpose
ImpacketPythonNetwork protocol suite (secretsdump, getST, ntlmrelayx, psexec)
RubeusC#Kerberos abuse (ticket requests, delegation, roasting)
MimikatzCCredential extraction, ticket forging, DCSync
CertipyPythonAD Certificate Services exploitation
NetExecPythonMulti-protocol network pentesting (successor to CrackMapExec)

Relay & Coercion

ToolLanguagePurpose
ntlmrelayxPython (Impacket)NTLM relay attacks
PetitPotamPythonEFS-based authentication coercion
CoercerPythonMulti-protocol coercion scanner
mitm6PythonIPv6 DNS takeover for relay

Initial Enumeration Essentials

Before attacking anything, map the domain. These commands give you the lay of the land.

BloodHound Collection

# Collect everything — run from a domain-joined machine or with creds
bloodhound-python -c All -u 'user' -p 'password' -d domain.local -ns DC_IP

# Or use SharpHound from a Windows host
.\SharpHound.exe -c All --zipfilename loot.zip

LDAP Enumeration

# Anonymous bind check
ldapsearch -x -H ldap://dc01.domain.local -b "DC=domain,DC=local"

# Authenticated full dump
ldapsearch -x -H ldap://dc01.domain.local -D "user@domain.local" -w 'password' \
  -b "DC=domain,DC=local" "(objectClass=*)"

PowerView Quick Reference

# Import
Import-Module .\PowerView.ps1

# Domain info
Get-Domain
Get-DomainController

# Users
Get-DomainUser -SPN                        # Kerberoastable accounts
Get-DomainUser -PreauthNotRequired          # AS-REP roastable
Get-DomainUser -AdminCount                  # Privileged users
Get-DomainUser | ? {$_.description -match "pass"} | select name,description

# Computers
Get-DomainComputer -Unconstrained           # Unconstrained delegation
Get-DomainComputer -TrustedToAuth           # Constrained delegation

# Groups & ACLs
Get-DomainGroup -AdminCount                 # Protected groups
Find-InterestingDomainAcl -ResolveGUIDs     # Misconfigured ACLs

# GPOs
Get-DomainGPO | select displayname,gpcfilesyspath
Get-DomainOU | select name,gplink

# Trusts
Get-DomainTrust
Get-ForestTrust

NetExec Quick Enum

# SMB enumeration
nxc smb 10.10.10.0/24
nxc smb dc01 -u user -p pass --users
nxc smb dc01 -u user -p pass --groups
nxc smb dc01 -u user -p pass --shares

# Check SMB signing (for relay targets)
nxc smb 10.10.10.0/24 --gen-relay-list relay-targets.txt

What’s Coming Next

PartTopic
Part 1Exploiting Permission Delegation (ACL Abuse)
Part 2Exploiting Kerberos Delegation
Part 3Exploiting Automated Relays (NTLM Relay)
Part 4Exploiting AD Users (Credential Attacks)
Part 5Exploiting GPOs
Part 6Exploiting AD Certificate Services (ADCS)
Part 7Exploiting Domain Trusts
Part 8Persistence & Post-Exploitation

 

 


Disclaimer: This content is intended for authorized security testing, education, and defensive research only. Always obtain written permission before testing against any environment you do not own.