πActive Directory Compromise
π― Overview
Active Directory Compromise represents the final phase of enterprise network penetration testing. Leverage GenericWrite privileges for targeted Kerberoasting, exploit Server Admins group membership for DCSync attacks, and achieve Domain Administrator access through systematic privilege escalation and credential harvesting.
π BloodHound Attack Path Analysis
π― GenericWrite Privilege Discovery
# mssqladm account analysis:
- GenericWrite over ttimmons user
- SQL service account privileges
- Domain credential access capability
# Attack vector identification:
GenericWrite β Fake SPN creation β Targeted Kerberoasting β Password crackingπ Attack Chain Visualization
# Privilege escalation path:
mssqladm (GenericWrite) β ttimmons (GenericAll) β Server Admins β DCSync
# BloodHound query results:
1. MSSQLADM@INLANEFREIGHT.LOCAL β GenericWrite β TTIMMONS@INLANEFREIGHT.LOCAL
2. TTIMMONS@INLANEFREIGHT.LOCAL β GenericAll β SERVER ADMINS@INLANEFREIGHT.LOCAL
3. SERVER ADMINS@INLANEFREIGHT.LOCAL β GetChanges/GetChangesAll β INLANEFREIGHT.LOCALπ« Targeted Kerberoasting Attack
π§ Fake SPN Creation
π― TGS Ticket Extraction
π Password Cracking
πΊ Server Admins Group Escalation
π₯ Group Membership Manipulation
π― DCSync Privileges Inheritance
π DCSync Attack Execution
π NTDS Database Extraction
π Domain Administrator Access
π― Post-Compromise Activities
π Complete Domain Control Validation
π Cleanup and Documentation
π Complete Attack Chain Summary
π External β Domain Admin Path
π Comprehensive Findings Summary
π οΈ Tools & Techniques Mastery
π Reconnaissance Tools
βοΈ Exploitation Techniques
π― HTB Academy Labs
π Final Lab Solutions
π Professional Methodology Demonstrated
π‘οΈ Comprehensive Defensive Recommendations
π Active Directory Hardening
π Network Security
Last updated