πŸ‘‘Active Directory Compromise

🎯 Overview

Active Directory Compromise represents the final phase of enterprise network penetration testing. Leverage GenericWrite privileges for targeted Kerberoasting, exploit Server Admins group membership for DCSync attacks, and achieve Domain Administrator access through systematic privilege escalation and credential harvesting.

πŸ” BloodHound Attack Path Analysis

🎯 GenericWrite Privilege Discovery

# mssqladm account analysis:
- GenericWrite over ttimmons user
- SQL service account privileges
- Domain credential access capability

# Attack vector identification:
GenericWrite β†’ Fake SPN creation β†’ Targeted Kerberoasting β†’ Password cracking

πŸ“Š Attack Chain Visualization

# Privilege escalation path:
mssqladm (GenericWrite) β†’ ttimmons (GenericAll) β†’ Server Admins β†’ DCSync

# BloodHound query results:
1. MSSQLADM@INLANEFREIGHT.LOCAL β†’ GenericWrite β†’ TTIMMONS@INLANEFREIGHT.LOCAL
2. TTIMMONS@INLANEFREIGHT.LOCAL β†’ GenericAll β†’ SERVER ADMINS@INLANEFREIGHT.LOCAL  
3. SERVER ADMINS@INLANEFREIGHT.LOCAL β†’ GetChanges/GetChangesAll β†’ INLANEFREIGHT.LOCAL

🎫 Targeted Kerberoasting Attack

πŸ”§ Fake SPN Creation

🎯 TGS Ticket Extraction

πŸ” Password Cracking

πŸ”Ί Server Admins Group Escalation

πŸ‘₯ Group Membership Manipulation

🎯 DCSync Privileges Inheritance

πŸ”„ DCSync Attack Execution

πŸ’Ž NTDS Database Extraction

πŸ‘‘ Domain Administrator Access

🎯 Post-Compromise Activities

πŸ“Š Complete Domain Control Validation

πŸ”’ Cleanup and Documentation

πŸ† Complete Attack Chain Summary

πŸš€ External β†’ Domain Admin Path

πŸ“‹ Comprehensive Findings Summary

πŸ› οΈ Tools & Techniques Mastery

πŸ” Reconnaissance Tools

βš”οΈ Exploitation Techniques

🎯 HTB Academy Labs

πŸ“‹ Final Lab Solutions

πŸ” Professional Methodology Demonstrated

πŸ›‘οΈ Comprehensive Defensive Recommendations

πŸ”’ Active Directory Hardening

🌐 Network Security

Last updated