Skip to content

Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonation techniques. Documented attack chains and mitigation strategies in detailed reports.

Notifications You must be signed in to change notification settings

Neofetcher/Active-Directory-Lab-Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

15 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Active Directory Lab Exploitation

Overview

This project simulates internal penetration testing scenarios in a self-hosted, vulnerable Active Directory (AD) environment. It demonstrates real-world attack techniques used by threat actors to escalate privileges and compromise domain controllers.

The goal of this lab is to understand the risks associated with misconfigured or vulnerable AD environments, test offensive security skills, and evaluate effective mitigation strategies.

πŸ”§ Lab Setup

  • Environment: Self-hosted using VMware
  • Operating Systems: Windows Server (Domain Controller), Windows 11 (Workstation), Kali Linux (Attacker)
  • Domain Configuration: Single-domain forest with realistic misconfigurations

πŸ” Simulated Attacks

1. Reconnaissance

  • Enumerated domain users, groups, and computers using PowerView and SharpHound
  • Mapped Active Directory trust relationships and privilege paths

2. Initial Foothold

  • Exploited misconfigured services (e.g., SMB, RDP, WinRM)
  • Performed password spraying and Kerberoasting

3. Privilege Escalation

  • Leveraged vulnerable service permissions and unquoted service paths
  • Conducted token impersonation and pass-the-hash attacks
  • Performed Kerberos delegation abuse (Unconstrained & Constrained)

4. Domain Compromise

  • Escalated to Domain Admin privileges
  • Dumped NTDS.dit and extracted domain credentials

πŸ“„ Documentation

Each attack path is documented with:

  • Step-by-step commands and screenshots
  • MITRE ATT&CK mappings
  • Tools used and their configurations
  • Detection and mitigation strategies

Reports are included

πŸ” Mitigation Strategies

The project also outlines defenses against each simulated attack, including:

  • Least privilege enforcement
  • Secure service configurations
  • Credential hygiene
  • Monitoring with Windows Event Logs and Sysmon
  • Attack path detection with BloodHound and Defender for Identity

⚠️ Disclaimer

This lab is intended for educational and ethical use only. All testing was performed in a controlled, isolated environment. Never use these techniques on networks you do not own or have explicit permission to test.

About

Simulated attacks on a vulnerable Active Directory environment, mimicking real-world internal penetration tests. Achieved domain admin privileges through privilege escalation and token impersonation techniques. Documented attack chains and mitigation strategies in detailed reports.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published