Site Link : https://indirect-aardvark.super.site/
Email: devanshjaiswal.work@gmail.com
A structured Active Directory (AD) attack simulation lab covering the full offensive lifecycle from initial domain foothold to Kerberos ticket abuse.
The project documents attack methodology, tooling, detection indicators, and mitigation strategies for each stage.
The objective is to understand how attackers move through an AD environment and how defenders can detect and stop them.
Currently implemented modules:
| Module | Phase | Focus |
|---|---|---|
| M1 | Initial AD Exploitation | LLMNR / NBT-NS poisoning |
| M2 | AD Enumeration | Domain discovery and privilege mapping |
| M3 | DACL Abuse | Active Directory permission abuse |
| M4 | Kerberos Abuse | Ticket extraction and password cracking |
| M5 | Credential Dumping | NTDS, SAM, DCSync attacks |
| M6 | Kerberos Ticket Attacks | Golden / Silver / Diamond tickets |
Future modules planned:
- Privilege Escalation
- Group-based attacks
- Persistence mechanisms
- ADCS abuse
Active Directory attacks generally follow a predictable progression:
Initial Access
↓
Enumeration
↓
Privilege Escalation
↓
Credential Dumping
↓
Kerberos Abuse
↓
Persistence
This repository walks through that chain step-by-step using a controlled lab environment.
Typical setup used in this project:
| Component | Technology |
|---|---|
| Attacker Machine | Kali Linux |
| Domain Controller | Windows Server |
| Domain | Active Directory |
| Tools | BloodHound, Responder, Impacket, PowerView |
Network model:
Kali (Attacker)
|
| Internal Network
|
Windows Domain Controller
|
Domain Users / Services
| Tool | Purpose |
|---|---|
| Responder | LLMNR / NBT-NS poisoning |
| BloodHound | AD privilege graph analysis |
| PowerView | Domain enumeration |
| RPCClient | SMB and AD queries |
| Impacket | Credential dumping and Kerberos abuse |
| NetExec / CrackMapExec | Lateral movement and enumeration |
| ADRecon | Domain reconnaissance |
Windows uses LLMNR and NBT-NS when DNS resolution fails.
An attacker can poison these broadcasts to impersonate legitimate hosts and capture authentication hashes.
- Start network poisoning listener
responder -I eth0 -dv
- Victim attempts name resolution.
- Attacker intercepts request.
- NTLM hash is captured.
Indicators:
- LLMNR traffic spikes
- Unusual responder services
- NTLM authentication to unknown hosts
Monitoring tools:
- Windows Event Logs
- Network IDS
- SIEM
- Disable LLMNR
- Disable NBT-NS
- Enforce SMB signing
- Use DNS properly configured
Once inside the domain network, the attacker maps:
- Users
- Groups
- Trust relationships
- Privilege escalation paths
| Tool | Purpose |
|---|---|
| BloodHound | Graph analysis of AD permissions |
| PowerView | PowerShell AD enumeration |
| RPCClient | SMB-based queries |
| NetExec | SMB / LDAP enumeration |
| ADRecon | Automated domain audit |
User discovery:
rpcclient -U "" <DC_IP>
enumdomusers
LDAP enumeration:
nxc ldap <target>
Indicators:
- Large LDAP queries
- High volume SMB enumeration
- BloodHound data collection
- Monitor LDAP queries
- Restrict anonymous enumeration
- Harden service accounts
Active Directory objects are controlled through Access Control Lists (ACL).
If misconfigured, an attacker can gain control of privileged accounts.
| Permission | Impact |
|---|---|
| GenericAll | Full control over object |
| GenericWrite | Modify attributes |
| WriteDACL | Change object permissions |
| WriteOwner | Take ownership |
| ForceChangePassword | Reset user password |
If attacker has GenericWrite on a user:
Change user password
Add user to privileged group
Modify attributes
- Changes to ACLs
- Unexpected privilege assignments
- Event ID monitoring
- Review ACL permissions
- Monitor sensitive object changes
- Use least privilege model
Kerberos is the primary authentication protocol in Active Directory.
Misconfigurations allow attackers to extract service ticket hashes and crack them offline.
| Attack | Description |
|---|---|
| AS-REP Roasting | Extract hash from users without pre-auth |
| Kerberoasting | Crack service account passwords |
| Timeroasting | Exploit time-based authentication |
| Kerberos brute force | Guess weak passwords |
- Request service ticket.
- Extract encrypted hash.
- Crack offline.
Example tool usage:
GetUserSPNs.py
Indicators:
- Large number of Kerberos service requests
- Ticket requests from unusual hosts
- Strong service account passwords
- Use Group Managed Service Accounts (gMSA)
- Monitor Kerberos anomalies
After privilege escalation, attackers extract credentials from system databases.
| Source | Data |
|---|---|
| SAM | Local account hashes |
| LSASS | Memory credentials |
| NTDS.dit | Domain password database |
| Registry Hives | System keys |
| Domain Cache | Cached credentials |
- NTDS.dit extraction
- SAM dumping
- DCSync
- LAPS password retrieval
- gMSA credential extraction
Attackers impersonate a Domain Controller and request password hashes.
Example:
secretsdump.py
- Replication requests from non-DC hosts
- Suspicious LSASS access
- NTDS database reads
- Restrict replication privileges
- Monitor DC replication
- Protect LSASS memory
Kerberos tickets can be forged or reused to maintain unauthorized access.
| Attack | Description |
|---|---|
| Golden Ticket | Forged TGT using KRBTGT hash |
| Silver Ticket | Forged service ticket |
| Diamond Ticket | Modified ticket from valid TGT |
| Sapphire Ticket | Advanced forged ticket |
| Pass-the-Ticket | Reuse stolen Kerberos ticket |
Requires:
- KRBTGT hash
- Domain SID
- Domain name
Attackers generate a fake TGT granting full domain access.
- Long ticket lifetimes
- Abnormal Kerberos activity
- Ticket usage without authentication
- Reset KRBTGT account twice
- Monitor Kerberos ticket anomalies
- Implement strict logging
AD-Attack-Lab
│
├── M1-Initial-Access
│
├── M2-Enumeration
│
├── M3-DACL-Abuse
│
├── M4-Kerberos-Abuse
│
├── M5-Credential-Dumping
│
├── M6-Kerberos-Tickets
│
└── README.md
This project demonstrates practical understanding of:
- Active Directory internals
- Attack path modeling
- Kerberos authentication
- Credential theft techniques
- Detection engineering
- Blue team mitigation strategies
This repository is intended strictly for educational and defensive security research.
All demonstrations were performed in a controlled lab environment.
Do not perform these techniques on systems without explicit authorization.