Skip to content

Commit

Permalink
new ad notes
Browse files Browse the repository at this point in the history
  • Loading branch information
syselement committed Jul 14, 2024
1 parent 6fa47a9 commit 6ab1edb
Show file tree
Hide file tree
Showing 12 changed files with 147 additions and 3 deletions.
4 changes: 3 additions & 1 deletion peh/2-lab/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,9 @@
> **Use it responsibly, ethically and with proper authorization for security testing!**
>
### Sections
---

## Sections

1. [Intro to Kali Linux](kali-linux.md)
2. [Intro to Python](python.md)
Expand Down
4 changes: 3 additions & 1 deletion peh/3-eth-hack/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

![Phases of Ethical Hacking - InfosecTrain](.gitbook/assets/Phases-of-Ethical-Hacking.png)

**Ethical hacking**, or **penetration testing**, identifies and addresses vulnerabilities in computer systems and networks through a structured process.
➡️ **Ethical hacking**, or **penetration testing**, identifies and addresses vulnerabilities in computer systems and networks through a structured process.

The five stages are:

Expand All @@ -16,6 +16,8 @@ The five stages are:
>
> **Use these techniques responsibly, ethically and with proper authorization for security testing!**
---

## Sections

1. [Information Gathering](recon.md)
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added peh/4-active-directory/.gitbook/assets/ad.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
8 changes: 8 additions & 0 deletions peh/4-active-directory/1-ad-lab.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
# Active Directory Lab

> **Lab Requirements**
>
> - 1 Windows Server
> - 2 Windows 10 Workstations
> - 60 GB Disk space
> - 16 GB RAM
2 changes: 2 additions & 0 deletions peh/4-active-directory/2-ad-init-vectors.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# AD - Initial Attack Vectors

1 change: 1 addition & 0 deletions peh/4-active-directory/3-ad-enum.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
# AD - Post-Compromise Enumeration
1 change: 1 addition & 0 deletions peh/4-active-directory/4-ad-attacks.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
# AD - Post-Compromise Attacks
1 change: 1 addition & 0 deletions peh/4-active-directory/5-ad-adv-attacks.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
# AD - Post-Compromise Attacks
1 change: 1 addition & 0 deletions peh/4-active-directory/6-ad-casestudies.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
# AD - Case Studies
126 changes: 125 additions & 1 deletion peh/4-active-directory/README.md
Original file line number Diff line number Diff line change
@@ -1 +1,125 @@
# 4. Active Directory
# 4. Active Directory

![](.gitbook/assets/ad.png)

🪟 **Active Directory** (**AD**) is a directory service developed by Microsoft for Windows domain networks. It provides directory services for managing Windows-based computers on a network. AD stores information about objects such as users, groups, computers, and other resources, and provides authentication and authorization services.

![Active Directory - academy.hackthebox.com](.gitbook/assets/1NdU4kfgwv6vgWRmsCZ1BXA.png)

---

## Physical components

- Data store
- Domain controllers
- Global catalog server
- Read-Only Domain Controller (RODC)



➡️ **Domain Controller** - a server with the [Active Directory Domain Services](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview) (**AD DS**) server role, specifically promoted to a domain controller

- Host a copy of the AD DS directory store
- Provide authentication and authorization services
- Replicate updates to other domain controllers
- Allow administrative access to manage user accounts and network resources



➡️ **AD DS Data store** - database files and processes that store and manage directory information for users, services and apps

- Contains `Ntds.dit` file - very important file (contains password hashes, etc)
- stored in the `%SystemRoot%\NTDS` folder on all domain controllers
- accessible only through the domain controller processes and protocols

---

## Logical components

- Partitions
- Schema
- Domains
- Domain trees
- Forests
- Sites
- Organization units (OUs)



➡️ **AD DS Schema** - (like a rulebook) defines every type of object that can be stored in the directory, enforces object creation and configuration rules

- Class object - what objects can be created in the directory (user, computer, etc)
- Attribute object - information that can be attached to an object (display name, etc)



➡️ **Domains** - used to group and manage objects in an organization

- Administrative boundary for applying policies to groups of objects
- Replication boundary for replicating data between domain controllers
- Authentication and authorization boundary - to limit the scope of access to resources



➡️ **Trees** - a hierarchy of domains in AD DS, that can

- share a contiguous namespace with the parent domain
- can have additional child domains
- (by default) create a 2-way transitive trust with other domains



➡️ **Forests** - a collection of domain trees

- Forests share common
- schema
- configuration partition
- global catalog to enable searching
- Enable trusts between all domains in the forest
- Share the **Enterprise Admins** and **Schema Admins** groups



➡️ **Organizational Units (OUs)** - AD containers that can contain users, groups, computers, other OUs

- Represent the organization hierarchically and logically
- Manage a collection of objects in a consistent way
- Delegate permissions to administer groups of objects
- Apply policies



➡️ **Trusts** - provide a mechanism for users to gain access to resources in another domain

- All domains in a forest trust all other domains in the forest
- Trusts can extend outside the forest

- **Directional** - the trust direction flows from trusting domain to the trusted domain
- trusting domain -> trusted domain
- **Transitive** - the trust relationship is extended to include other trusted domains



➡️ **Objects**

- User - Enables network resource access for a user
- InetOrgPerson - Used for compatibility with other directory services
- Contacts - Used primarily to assign e-mail addresses to external users; no network access
- Groups - Used to simplify the administration of access control
- Computers - Enable authentication and auditing of computer access to resources
- Printers - Simplify the process of locating and connecting to printers
- Shared folders - Enables users to search for shared folders based on preperties

---

## Sections

1. [Active Directory Lab](1-ad-lab.md)
1. [AD - Initial Attack Vectors](2-ad-init-vectors.md)
1. [AD - Post-Compromise Enumeration](3-ad-enum.md)
1. [AD - Post-Compromise Attacks](4-ad-attacks.md)
1. [AD - Additional Attacks](5-ad-adv-attacks.md)
1. [AD - Case Studies](6-ad-casestudies.md)

---

2 changes: 2 additions & 0 deletions peh/peh-references.md
Original file line number Diff line number Diff line change
Expand Up @@ -147,6 +147,8 @@

## Active Directory

- [Active Directory Domain Services](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview)
- [Introduction to Active Directory - HTB Academy](https://academy.hackthebox.com/module/details/74)
- [PimpmyADLab](https://github.com/Dewalt-arch/pimpmyadlab)
- [Building a Windows AD lab](https://ad-lab.gitbook.io/building-a-windows-ad-lab/)
- [GrouppVM](https://github.com/vulfilip/grouppvm)
Expand Down

0 comments on commit 6ab1edb

Please sign in to comment.