• Simulate a real enterprise Active Directory environment
  • Practice enumeration, password attacks, privilege escalation, and lateral movement
  • Learn to chain together multiple misconfigurations for full domain compromise
SettingValue
Domain Namecorp.local
Domain ControllerWindows Server (GUI version)
Domain Admin Accountcorp\administrator
Network Adapter ModeHost-Only or Internal
DNS Role InstalledYes (used for AD & name resolution)
corp.local
├── HR
├── IT
├── Finance
├── Sales
├── Executives
├── ServiceAccounts
├── Groups
├── Computers
UsernameDisplay NameDepartmentRolePasswordPrivilege Notes
jsmithJohn SmithHRAssistantHRrocks2024!Low priv, member of HR_Admins
knguyenKim NguyenHRManagerHRmanager2024!Higher trust, in HR_Admins
mbrownMary BrownITAdminSuperSecure!123Added to Domain Admins
rjohnsonRobert JohnsonITHelpdeskHelpdesk123Low priv, WriteDACL on svc_backup
nleeNick LeeITSec AnalystSecAnalyst!In IT_Admins, RDP rights
adavisAnna DavisFinanceAccountantFinance$Access2024Standard user
bwhiteBarbara WhiteFinanceCFOFinanceQueen123High value target
tclarkTim ClarkSalesRepPassword1Weak password, lateral movement target
jramirezJose RamirezSalesManagerSales123Member of Helpdesk, weak password
ajonesAlice JonesExecutiveCEOCEO_StrongPass2024!High value target
svc_backupBackup ServiceServiceAccountRuns backupsSvcBack!2024Has SPN, member of Domain Admins
svc_webappWeb App ServiceServiceAccountRuns web appWebAppUser!Has SPN, low priv
Group NameMembersPurpose
HR_Adminsjsmith, knguyenHR OU access
IT_Adminsmbrown, nleeAdmins of IT systems
Finance_Usersadavis, bwhiteFinance share access
Helpdeskrjohnson, jramirezPassword resets, low priv group
OU_HR_PolicyManagersHR_AdminsNested delegation scenario
Domain Adminsadministrator, mbrown, svc_backupFull domain access
TechniqueWhereHow to Exploit
Kerberoastingsvc_backup, svc_webappSPNs assigned, request TGS, crack offline
GPP Password Exposure\\corp.local\SYSVOL\...Groups.xml with gppPassword123!
WriteDACL Abuserjohnsonsvc_backupUse PowerView or BloodHound to escalate
Weak Passwordstclark, jramirezPassword spraying, brute-force
High Privilege Servicesvc_backupHas Domain Admin rights, crack = DA
Group NestingHR_Admins in PolicyManagersLateral edge for BloodHound
Dummy Credentialscreds.txt on jsmith‘s DesktopManual discovery / credential reuse
SPNs on Serviceshttp/webapp, backup/corpdcKerberoast via Impacket
Share NamePathPermissions
HR-ShareC:\Shares\HR-ShareHR_Admins full
FinanceC:\Shares\FinanceFinance_Users full
PublicC:\Shares\PublicEveryone change

Accessible with:

smbclient -L \\dc-ip -U jsmith
CategoryTechniques/Tools
🧭 Enumerationldapsearch, rpcclient, net user, PowerView, BloodHound
🗝️ Credential AttacksKerberoasting, AS-REP Roasting, Password Spraying
🧬 Privilege EscalationGPP Decryption, ACL abuse, group nesting
🔄 Lateral MovementUse stolen creds for PsExec, Enter-PSSession, RDP
🔎 Service EnumerationEnumerate shares, services, logged-in users
🧠 Path ChainingLow-priv user → ACL abuse → Kerberoast → Domain Admin
  1. Enumerate SPNs → svc_backup
  2. Crack ticket hash → recover password
  3. Log in → it’s a Domain Admin
  1. Log in as rjohnson
  2. Abuse WriteDACL on svc_backup
  3. Add yourself to Domain Admins group or reset password
  1. Start as jsmith (HR)
  2. Find creds.txt with svc creds
  3. Access shares, pivot to backup server
  4. Dump creds with Mimikatz
ToolUse Case
PowerViewAD enumeration, ACL abuse
BloodHoundFull AD relationship mapping
MimikatzCredential dumping, pass-the-hash
CrackMapExecQuick AD recon, pwn checks
Impacket toolsGetUserSPNs.py, secretsdump.py, etc.
SMB toolssmbclient, enum4linux, rpcclient
  • Run BloodHound and map privilege paths
  • Use GetUserSPNs.py to pull service tickets and crack with Hashcat
  • Try password spraying with CrackMapExec against weak users
  • Practice privilege escalation with PowerView or SharpHound
  • Chain it all into a simulated red team kill chain

Scroll to Top