EN
ENNA
🔥
Advanced2-5 days|6 steps, 26 tools

Active Directory Attack Path

From initial foothold to domain admin. A step-by-step approach to enumerating and attacking Active Directory environments during authorized penetration tests.

active-directoryred-teamlateral-movementprivilege-escalation
1

Initial Enumeration

Once you have a foothold on a domain-joined machine (or credentials), start mapping the environment. Enumerate users, groups, computers, group policies, trust relationships, and ACLs. This gives you the lay of the land and reveals potential attack paths before you start making noise.

Tip: BloodHound is the single most important tool here. SharpHound collects the data, BloodHound visualizes attack paths to Domain Admin. Run it first, study the output, plan your moves. CrackMapExec does quick checks across the network without BloodHound's collection overhead.

2

Credential Harvesting

Look for credentials everywhere. Check for Kerberoastable accounts (service accounts with SPNs), AS-REP roastable accounts (no pre-authentication required), cached credentials, credentials in Group Policy Preferences, LSASS dumps, and passwords in shares or scripts.

Tip: Rubeus handles Kerberoasting, AS-REP roasting, and ticket manipulation. Mimikatz dumps credentials from memory. LaZagne recovers passwords stored by browsers, mail clients, and other software. CrackMapExec can spray passwords across the domain to find reuse.

3

Coercion and Relay Attacks

Force machines to authenticate to you, then relay those credentials to other services. This is one of the most powerful attack chains in AD - coerce a domain controller to authenticate to your machine, relay that authentication to AD Certificate Services, and get a certificate you can use for domain admin access.

Tip: PetitPotam coerces authentication via MS-EFSRPC. Coercer tries multiple coercion methods automatically. Responder captures hashes from LLMNR/NBT-NS poisoning. Impacket's ntlmrelayx relays captured authentication to target services. The PetitPotam to AD CS relay chain is devastating when it works.

4

Lateral Movement

Move through the network using the credentials and access you've gathered. Use WinRM, SMB, WMI, or DCOM to execute commands on remote machines. Pivot through compromised hosts to reach network segments you couldn't access from your initial position.

Tip: Evil-WinRM gives you a PowerShell session on remote machines via WinRM. CrackMapExec executes commands across multiple hosts simultaneously. Ligolo-ng and Chisel create tunnels for pivoting through compromised networks. Keep track of which credentials work on which machines.

5

Privilege Escalation

Escalate from your current access level to Domain Admin. BloodHound's analysis often reveals the shortest path. Common routes include abusing GenericAll/GenericWrite permissions on privileged groups, exploiting certificate templates via AD CS, shadow credentials attacks, and resource-based constrained delegation abuse.

Tip: Whisker adds shadow credentials for stealthy Kerberos authentication. Certipy finds and exploits vulnerable AD CS certificate templates. PowerSploit's PowerView module helps enumerate ACL-based attack paths. Re-run SharpHound after compromising new accounts - you may see new paths.

6

Persistence and Domain Dominance

Once you have Domain Admin, demonstrate the full impact. Extract the NTDS.dit database, create golden/silver tickets, and document the complete attack chain. In a real engagement, this proves the business impact and helps the client understand what needs to be fixed and in what order.

Tools for this step

Tip: Impacket's secretsdump.py extracts all domain hashes remotely. Document every step of your attack chain with timestamps and evidence. The client needs to understand not just that you got Domain Admin, but how, so they can fix the path.

Other Workflows