Active Directory Exploitation

AD mindmap - https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.svg

Notes on tooling

Automatic Enumeration

Enum4Linux-ng

PingCastle

NTLMRecon

Service Enumeration

SMB

LDAP

ldapmodify -x -H ldap://{dc_ip} -D "{owned_username}@{domain}" -W << EOF
dn: CN={target_name_from_ldapsearch},CN=Users,DC={domain},DC={tld}
changetype: modify
replace: userAccountControl
userAccountControl: 66048
EOF

RPC

Exchange

Enumerating the Domain with BloodHound/SharpHound

Capturing the system data with SharpHound:

Ensuring all data collection

Analyzing the data with BloodHound

Password Attacks

Cached Credentials

Password Spraying

AS-REP Roasting

Kerberoasting

Timeroasting

Silver Tickets

Poisoning, Coercing, and Relaying

Poisoning

Coercing

Relaying

Getting execution with credentials or hashes

ADCS

SCCM

Recon

Exploitation

Post Exploitation

Miscellaneous

Abusing Domain Controller Synchronization

Dump NTDS from shell access

UAC Fatigue