How to Master Active Directory Exploitation: A Practical Blueprint
Active Directory (AD) isn’t just a single service — it’s an entire identity ecosystem. To become effective at exploiting it, you need to understand how the parts fit together: authentication, trust, delegation, permissions, and misconfigurations. This guide is your direct path to mastering AD exploitation.
1. Kerberos and NTLM (Authentication Protocols)
Understanding how authentication works is foundational. Focus on how Kerberos functions: Ticket Granting Ticket (TGT), Ticket Granting Service (TGS), service tickets, and how encryption keys tie it all together.
Key techniques:
- AS-REP Roasting (when pre-auth is disabled)
- Kerberoasting (targeting SPNs)
- Pass-the-Ticket and Overpass-the-Hash
- Golden and Silver Ticket attacks
- Delegation abuse (Unconstrained, Constrained, Resource-Based Constrained Delegation)
Essential tools:
- Rubeus
- Mimikatz
- Impacket
- Kekeo
2. Enumeration is 90% of the Game
Without proper enumeration, exploitation is blind. Effective enumeration reveals attack paths, user permissions, and lateral movement opportunities.
Key tools:
- BloodHound for visualizing relationships and attack paths
- PowerView for in-memory enumeration
- CrackMapExec for network-wide probing
- ldapsearch, ldapdomaindump, SharpHound for structured data extraction
Questions to constantly ask:
- Who am I?
- What can I access?
- Who is logged in where?
- What tickets or tokens do I have?
- How do I move forward?
3. Misconfigurations and Trust Abuse
This is where most real-world exploitation happens. Trust relationships and misconfigurations allow privilege escalation without any exploits.
Common abuses:
- Weak ACLs (GenericAll, WriteDACL, WriteOwner)
- Misconfigured Group Policy Objects
- Overly trusted service accounts
- AdminSDHolder misconfigurations
- Service Principal Names (SPNs) exposed to Kerberoasting or RBCD
Useful tooling includes SharpHound, ACLight, BloodHound.py, and PowerView functions like Get-ObjectAcl.
4. Persistence Techniques
Once you gain privileged access, knowing how to stay undetected is key.
Persistence options:
- Golden or Silver Tickets
- Skeleton Key attacks
- SID History injection
- AdminSDHolder manipulation
- Malicious GPO injection
- WMI Event Subscriptions
Persistence should blend into the environment and survive reboots and reauthentications.
5. Lateral Movement and Privilege Escalation
Effective attackers move laterally before moving vertically. Target systems where valuable sessions or credentials exist.
Techniques:
- Token impersonation (e.g., Incognito, Rubeus)
- SMB, PSRemoting, WinRM, and WMI abuse
- Session hijacking via
query user,qwinsta, or PowerView’sGet-NetSession - RDP hijacking or service manipulation
Tools like psexec.py, smbexec.py, and custom PowerShell remoting scripts are commonly used.
6. Group Policy Object (GPO) Abuse
GPOs are a reliable way to scale configuration—and to exploit it.
Examples:
- Deploy a malicious startup or logon script
- Add your user to the local Administrators group
- Modify scheduled tasks or services
- Deploy payloads through GPP or Registry edits
GPOs can be powerful tools for both initial compromise and persistence.
7. Service Abuse and Local Privilege Escalation
Escalating from user to SYSTEM on a domain-joined machine is a key step.
Look for:
- Unquoted service paths
- Weak file or service permissions
- Insecure service configurations
- Binary planting opportunities
Commands like sc qc, icacls, accesschk, and whoami /groups are critical for identifying local escalation paths.
8. Active Directory Certificate Services (AD CS)
Misconfigured enterprise certificate services are a rich attack surface.
Focus on:
- ESC1 through ESC8 misconfigurations
- Abusing
Enrollrights on vulnerable templates - Using certificate authentication to impersonate users
Tools like Certify, Certipy, and ForgeCert can generate certificates to impersonate Domain Admins when conditions are met.
9. Credential Hunting and Password Abuse
Credentials are often scattered across file shares, memory, and the registry.
Hunting techniques:
- Dumping SAM/LSASS
- Dumping secrets with
secretsdump.py - Extracting passwords from SYSVOL (GPP, scripts)
- LAPS enumeration
- Password reuse across services and accounts
Tools include gpp-decrypt, mimikatz, secretsdump.py, and password crackers like john and hashcat.
10. Build and Practice in Your Own Lab
Theory without hands-on practice leads to shallow understanding. Build an Active Directory lab with:
- A Windows Server domain controller
- A domain-joined Windows 10 or 11 workstation
- A Kali Linux or ParrotOS attacker box
Populate it with users, groups, and service accounts. Practice:
- Enumeration with BloodHound and PowerView
- Token manipulation and lateral movement
- Delegation abuse
- Ticket forging and persistence techniques
If you can recreate real-world attack chains end-to-end in your lab, you’re ready for live environments.
Your AD Exploitation Progression Map
- Initial Access (User Shell or Foothold)
- Enumeration (Who/Where/What/How)
- Credential or Ticket Collection
- Lateral Movement to Valuable Targets
- Service Abuse or Delegation Exploits
- Privilege Escalation to Domain Admin
- Persistence and Cleanup
Final Advice
- Never rely solely on tools; understand the logic and flows beneath the surface.
- Learn what every BloodHound edge means and how to exploit it manually.
- Take your time to build and walk full attack paths, not isolated techniques.
- Treat AD like a map: the more you understand the topology, the more dangerous you become.
