Active Directory Attack Lab
easy
16 tasks
1 hour
A Practical Guide to Exploiting a Windows Domain Controller
This hands-on lab walks you through the full lifecycle of an Active Directory breach—starting from initial network reconnaissance and LLMNR poisoning, to password cracking, enumeration of domain trusts, privilege escalation via group membership abuse, and ultimately gaining Domain Admin access.
List of tasks
- Tasks
- Introduction
- Find Target IP
- Information Gathering 1
- Information Gathering 2
- Exploitation: Leveraging Weaknesses
- Cracking the Hash With John The Ripper
- Post-Exploitation: Leveraging our Credentials
- Interacting with SMB Shares
- Capture User Flag
- Deeper Enumeration with Valid Credentials
- Enumerating Domain Admins Group Members
- Enumerating the Operators Group Members
- Plan for Privilege Escalation
- Changing the Password
- Verifying Root Access
- Capture the Root flag