TCM Security Academy Notes - by syselement
Home BlogGitHubBuy Me a Book
  • TCM Security Academy Notes
  • Courses
    • TCM - Linux 101
      • 1. Introduction
        • Linux Distributions
        • Installing Linux
      • 2. Command Line
        • Intro to Command Line
        • Getting help on the Command Line
        • Command Line Arguments and Options
        • Reading Text Files
      • 3. File System
        • Filesystem Hierarchy Standard
        • Devices, Partitions and Mounting
        • Absolute and Relative Paths
        • Files and Directories
        • Paths, Filenames and Text Files
        • Filesystem Links
        • Archiving and Searching Files
      • 4. Users and Groups
        • Working with Users and Groups
        • File and Directory Permissions
        • Changing Users and Passwords
      • 5. Installing Software
        • Package Management
      • 6. Shells
        • Common Command Line Shells
        • Environment Variables & Startup Files
        • Input/Output Redirection
        • Command History & Substitution
      • 7. Utilities and File Editors
        • Searching and Processing Text
        • Networking at the Command Line
        • File Transfer
        • Text Editors and Converters
      • 8. Process Management
        • Process Information
        • Foreground and Background Processes
        • Managing Processes
        • Scheduling Processes
      • 9. Regular Expressions
        • Regular Expressions, Searching, Replacing, Building
      • 10. Bash Scripting
        • Bash Scripting Basics, Control Structures, Loops
      • 🌐Linux101 References
    • TCM - Mobile Application Penetration Testing
      • 1. Introduction & Mobile Pentesting
      • 2. Android Security
      • 3. Android Lab Setup
      • 4. Android Static Analysis
      • 5. Android Dynamic Analysis
      • 6. Android Bug Bounty
      • 7. iOS Security
      • 8. iOS Lab Setup
      • 9. iOS Static Analysis
      • 10. iOS Dynamic Analysis
      • 11. iOS Bug Bounty
      • 🌐MAPT References
    • TCM - Practical Ethical Hacking
      • 1. Introduction & Networking
      • 2. Lab Set Up, Linux & Python
        • Intro to Kali Linux
        • Intro to Python
      • 3. The Ethical Hacker Methodology
        • Information Gathering
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • Capstone Practical Labs
      • 4. Active Directory
        • Active Directory Lab
        • AD - Initial Attack Vectors
        • AD - Post-Compromise Enumeration
        • AD - Post-Compromise Attacks
        • AD - Additional Attacks
        • AD - Case Studies
      • 5. Post Exploitation
      • 6. Web Application
        • Web App Lab Setup
        • Web App - SQL Injection
        • Web App - XSS
        • Web App - Command Injection
        • Web App - Insecure File Upload
        • Web App - Authentication Attacks
        • Web App - XXE
        • Web App - IDOR
        • Web App - Capstone Practical Lab
      • 7. Wireless Attacks
      • 8. Legal Documentation & Report Writing
      • 🌐PEH References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Windows Server 2022
  • Windows 10

Was this helpful?

Edit on GitHub
  1. Courses
  2. TCM - Practical Ethical Hacking
  3. 4. Active Directory

Active Directory Lab

Previous4. Active DirectoryNextAD - Initial Attack Vectors

Last updated 3 months ago

Was this helpful?

Lab Requirements

  • 1 Windows Server

  • 2 Windows 10 Workstations

    • 60 GB Disk space

    • 16 GB RAM

  • Proceed with installing a Windows Server 2022 VM and two Windows 10 VMs inside VMware

    • For each of them install the VMware tools


Windows Server 2022

🔗

  • Hostname - HYDRA-DC

  • User (domain admin) - administrator:P@$$w0rd!

  • IP - set a static IP

    • Control Panel\Network and Internet\Network Connections

    • IPv4 IP - 192.168.31.90 (in my lab)

  • Add the following server roles

    • Active Directory Domain Services

    • Active Directory Certificate Services

  • Domain - MARVEL.local

  • Active Directory Users and Computers

    • Copy the Administrator user and create a second domain admin

      • tstark:<yourpassword>

    • Copy the Administrator user and create a service account

      • SQLService:MYpassword123#

    • Create new users

      • fcastle:Password1

      • pparker:Password1

  • File and Storage Services

    • Create a new SMB Share Quick - hackme

  • Group Policy Management

    • Create a new Enforced GPO - Disable Windows Defender

      • Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Microsoft Defender Antivirus - Enable Turn off Microsoft Defender Antivirus

  • SPN - Register the Service Principal Name - SQLService

setspn -a HYDRA-DC/SQLService.MARVEL.local:60111 MARVEL\SQLService

# Query for SPN
setspn -T MARVEL.local -Q */*
  • Open Powershell as admin and set timezone

Set-TimeZone "W. Europe Standard Time"

Windows 10

  • Hostname1 - THEPUNISHER

    • User - frankcastle:Password1

  • Hostname2 - SPIDERMAN

    • User - peterparker:Password1

  • IP - set the DNS to the DC IP - 192.168.31.90

  • Join both VMs to the MARVEL.local domain

    • Login using MARVEL\administrator:P@$$w0rd!

    • Edit local users and groups

      • Reset password and enable local Administrator:Password1!

      • Add the domain users to the Administrators group

        • fcastle for THEPUNISHER VM

        • fcastle and pparker for SPIDERMAN VM

  • Go to Network and turn on Network discovery and file sharing

SPIDERMAN - Logoff and login locally to .\peterparker:Password1

  • Map Network Drive - \\HYDRA-DC\hackme , reconnect at sign-in, using different credentials


VM
IP

hydra-dc.MARVEL.local

192.168.31.90

spiderman.MARVEL.local

192.168.31.92

thepunisher.MARVEL.local

192.168.31.93

  • Set /etc/hosts in the Kali VM

192.168.31.90  hydra-dc.MARVEL.local
192.168.31.92  spiderman.MARVEL.local
192.168.31.93  thepunisher.MARVEL.local

🔗

Win Server 2022 Evaluation iso - direct link
Windows 10 Enterprise iso