Active Directory Attack Lab: Recon-to-Root
intermediate
18 tasks
1 hour
This step-by-step lab walks you through real-world AD attack techniques—starting with port scans and ending in full domain compromise using tools like nmap, kerbrute, evil-winrm, and BloodHound. Perfect for aspiring red teamers and security learners.
List of tasks
- tasks
- Active Directory Lab Overview
- Full TCP Port Scan on Target Host
- Service and Version Detection
- Null Session SMB Enumeration
- LDAP Anonymous Bind Check
- Kerberos Username Enumeration
- Password Brute Force via SMB Login
- What Comes Next
- Dump Domain Information via LDAP
- Perform Remote AD Recon with BloodHound
- Set Up Neo4j and Launch BloodHound GUI
- Abuse ForceChangePassword Right via RPC
- Validate New Credentials via WinRM
- Enumerate Local Privileges and AutoLogon
- Reuse Administrator Credentials
- Capture the User Flag
- Capture the Root Flag
- Final Reflection