TCM Security Academy Notes - by syselement
Home BlogGitHubBuy Me a Book
  • TCM Security Academy Notes
  • Courses
    • TCM - Linux 101
      • 1. Introduction
        • Linux Distributions
        • Installing Linux
      • 2. Command Line
        • Intro to Command Line
        • Getting help on the Command Line
        • Command Line Arguments and Options
        • Reading Text Files
      • 3. File System
        • Filesystem Hierarchy Standard
        • Devices, Partitions and Mounting
        • Absolute and Relative Paths
        • Files and Directories
        • Paths, Filenames and Text Files
        • Filesystem Links
        • Archiving and Searching Files
      • 4. Users and Groups
        • Working with Users and Groups
        • File and Directory Permissions
        • Changing Users and Passwords
      • 5. Installing Software
        • Package Management
      • 6. Shells
        • Common Command Line Shells
        • Environment Variables & Startup Files
        • Input/Output Redirection
        • Command History & Substitution
      • 7. Utilities and File Editors
        • Searching and Processing Text
        • Networking at the Command Line
        • File Transfer
        • Text Editors and Converters
      • 8. Process Management
        • Process Information
        • Foreground and Background Processes
        • Managing Processes
        • Scheduling Processes
      • 9. Regular Expressions
        • Regular Expressions, Searching, Replacing, Building
      • 10. Bash Scripting
        • Bash Scripting Basics, Control Structures, Loops
      • 🌐Linux101 References
    • TCM - Mobile Application Penetration Testing
      • 1. Introduction & Mobile Pentesting
      • 2. Android Security
      • 3. Android Lab Setup
      • 4. Android Static Analysis
      • 5. Android Dynamic Analysis
      • 6. Android Bug Bounty
      • 7. iOS Security
      • 8. iOS Lab Setup
      • 9. iOS Static Analysis
      • 10. iOS Dynamic Analysis
      • 11. iOS Bug Bounty
      • 🌐MAPT References
    • TCM - Practical Ethical Hacking
      • 1. Introduction & Networking
      • 2. Lab Set Up, Linux & Python
        • Intro to Kali Linux
        • Intro to Python
      • 3. The Ethical Hacker Methodology
        • Information Gathering
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • Capstone Practical Labs
      • 4. Active Directory
        • Active Directory Lab
        • AD - Initial Attack Vectors
        • AD - Post-Compromise Enumeration
        • AD - Post-Compromise Attacks
        • AD - Additional Attacks
        • AD - Case Studies
      • 5. Post Exploitation
      • 6. Web Application
        • Web App Lab Setup
        • Web App - SQL Injection
        • Web App - XSS
        • Web App - Command Injection
        • Web App - Insecure File Upload
        • Web App - Authentication Attacks
        • Web App - XXE
        • Web App - IDOR
        • Web App - Capstone Practical Lab
      • 7. Wireless Attacks
      • 8. Legal Documentation & Report Writing
      • 🌐PEH References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Physical components
  • Logical components
  • Sections

Was this helpful?

Edit on GitHub
  1. Courses
  2. TCM - Practical Ethical Hacking

4. Active Directory

PreviousCapstone Practical LabsNextActive Directory Lab

Last updated 8 months ago

Was this helpful?

🪟 Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It provides directory services for managing Windows-based computers on a network. AD stores information about objects such as users, groups, computers, and other resources, and provides authentication and authorization services.


Physical components

  • Data store

  • Domain controllers

  • Global catalog server

  • Read-Only Domain Controller (RODC)

  • Host a copy of the AD DS directory store

  • Provide authentication and authorization services

  • Replicate updates to other domain controllers

  • Allow administrative access to manage user accounts and network resources

➡️ AD DS Data store - database files and processes that store and manage directory information for users, services and apps

  • Contains Ntds.dit file - very important file (contains password hashes, etc)

    • stored in the %SystemRoot%\NTDS folder on all domain controllers

    • accessible only through the domain controller processes and protocols


Logical components

  • Partitions

  • Schema

  • Domains

  • Domain trees

  • Forests

  • Sites

  • Organization units (OUs)

➡️ AD DS Schema - (like a rulebook) defines every type of object that can be stored in the directory, enforces object creation and configuration rules

  • Class object - what objects can be created in the directory (user, computer, etc)

  • Attribute object - information that can be attached to an object (display name, etc)

➡️ Domains - used to group and manage objects in an organization

  • Administrative boundary for applying policies to groups of objects

  • Replication boundary for replicating data between domain controllers

  • Authentication and authorization boundary - to limit the scope of access to resources

➡️ Trees - a hierarchy of domains in AD DS, that can

  • share a contiguous namespace with the parent domain

  • can have additional child domains

  • (by default) create a 2-way transitive trust with other domains

➡️ Forests - a collection of domain trees

  • Forests share common

    • schema

    • configuration partition

    • global catalog to enable searching

  • Enable trusts between all domains in the forest

  • Share the Enterprise Admins and Schema Admins groups

➡️ Organizational Units (OUs) - AD containers that can contain users, groups, computers, other OUs

  • Represent the organization hierarchically and logically

  • Manage a collection of objects in a consistent way

  • Delegate permissions to administer groups of objects

  • Apply policies

➡️ Trusts - provide a mechanism for users to gain access to resources in another domain

  • All domains in a forest trust all other domains in the forest

  • Trusts can extend outside the forest

  • Directional - the trust direction flows from trusting domain to the trusted domain

    • trusting domain -> trusted domain

  • Transitive - the trust relationship is extended to include other trusted domains

➡️ Objects

  • User - Enables network resource access for a user

  • InetOrgPerson - Used for compatibility with other directory services

  • Contacts - Used primarily to assign e-mail addresses to external users; no network access

  • Groups - Used to simplify the administration of access control

  • Computers - Enable authentication and auditing of computer access to resources

  • Printers - Simplify the process of locating and connecting to printers

  • Shared folders - Enables users to search for shared folders based on preperties


Sections


➡️ Domain Controller - a server with the (AD DS) server role, specifically promoted to a domain controller

Active Directory Domain Services
Active Directory Lab
AD - Initial Attack Vectors
AD - Post-Compromise Enumeration
AD - Post-Compromise Attacks
AD - Additional Attacks
AD - Case Studies
Active Directory - academy.hackthebox.com