Active Directory Exploitation

AD mindmap - https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.svg

Notes on tooling

Automatic Enumeration

Enum4Linux-ng

PingCastle

NTLMRecon

Service Enumeration

SMB

LDAP

ldapmodify -x -H ldap://{dc_ip} -D "{owned_username}@{domain}" -W << EOF
dn: CN={target_name_from_ldapsearch},CN=Users,DC={domain},DC={tld}
changetype: modify
replace: userAccountControl
userAccountControl: 66048
EOF

RPC

Exchange

Enumerating the Domain with BloodHound/SharpHound

Capturing the system data with SharpHound:

Ensuring all data collection

Analyzing the data with BloodHound

Password Attacks

Cached Credentials

Password Spraying

AS-REP Roasting

Kerberoasting

Silver Tickets

Poisoning, Coercing, and Relaying

Poisoning

Coercing

Relaying

Getting execution with credentials or hashes

ADCS

SCCM

Recon

Exploitation

Post Exploitation

Miscellaneous

UAC Fatigue