Active Directory Exploitation & Pivotting Lab

Attacking AD in a virtualized environment

  • Utilized VMWare Workstation Pro to setup an Active Directory environment to learn and practice AD enumeration, exploitation, and pivoting techniques.
  • Setup a domain controller with group policy objects to emulate a real life, insecure Windows environment.
  • Setup two vulnerable host machines and joined them to the AD domain.
  • Used a Kali attack box to enumerate the AD environment, intercept and spoof NTLM traffic, and practice Kerberoasting and other common AD attack methods to compromise each host in the domain, as well as the domain controller.