Skip to content

newtonguass/ADPenLab

Repository files navigation

ADPenTest Lab

This repository ami to provide a quick setup for simple AD penetration environment, including

  • Azure AD PenTest Environment
    • Quick start template to build one domain controller and a compute ready for join domain
    • Leverage the Azure bastion server to RDP to enhance the ADPen environment.
  • Domain Attack Kill Chain Lab
    • Reconn
      • SPN scanning
      • User, Group, Computer enum
      • High privilege account hunting
      • Attacking path finding
    • PrivilegeEsclation
      • Exploiting group policy vulnerability
      • Hidden account
    • CredentialDumping & Lateral Movement
      • Responder
      • Handcraft of simple Mimikatz
      • Kerberoasting
    • Persistence
      • NTLM Relay
      • DC sync


AD Pen test environment quick setup in Azure

  • This template creates three VM in Azure
    1. Domain Controller
      • Win Server 2016
      • With some example OU and one unconstrained delegation account
      • Enable customized GPO
    2. client
      • Win 10
      • With vulnerable service for privilege ecalation practice
    3. Relay Victim
      • Win Server 2016
      • Very vulnerable web service for SSRF
      • High privileged computer account for realy practice(by using the cve2018-8581)
  • Carefully select the VM size, because the quota for Azure free account is limited to 4 cores.
  • Since default network security group does not allow inbound connection from internet and there are no public IP in those VMs, you need to use bastion server to connect VMs. if you want to RDP directly, you need to add public IP and change the network security group.
  • If you not use the default user name and password, the computer will not join the domain automatically. You need to join the domain on your own.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published