TCM Security Academy Notes - by syselement
🏠 Home BlogGitHub📚 Buy Me a Book
  • TCM Security Academy Notes
  • Courses
    • TCM - Linux 101
      • 1. Introduction
        • Linux Distributions
        • Installing Linux
      • 2. Command Line
        • Intro to Command Line
        • Getting help on the Command Line
        • Command Line Arguments and Options
        • Reading Text Files
      • 3. File System
        • Filesystem Hierarchy Standard
        • Devices, Partitions and Mounting
        • Absolute and Relative Paths
        • Files and Directories
        • Paths, Filenames and Text Files
        • Filesystem Links
        • Archiving and Searching Files
      • 4. Users and Groups
        • Working with Users and Groups
        • File and Directory Permissions
        • Changing Users and Passwords
      • 5. Installing Software
        • Package Management
      • 6. Shells
        • Common Command Line Shells
        • Environment Variables & Startup Files
        • Input/Output Redirection
        • Command History & Substitution
      • 7. Utilities and File Editors
        • Searching and Processing Text
        • Networking at the Command Line
        • File Transfer
        • Text Editors and Converters
      • 8. Process Management
        • Process Information
        • Foreground and Background Processes
        • Managing Processes
        • Scheduling Processes
      • 9. Regular Expressions
        • Regular Expressions, Searching, Replacing, Building
      • 10. Bash Scripting
        • Bash Scripting Basics, Control Structures, Loops
      • 🌐Linux101 References
    • TCM - Mobile Application Penetration Testing
      • 1. Introduction & Mobile Pentesting
      • 2. Android Security
      • 3. Android Lab Setup
      • 4. Android Static Analysis
      • 5. Android Dynamic Analysis
      • 6. Android Bug Bounty
      • 7. iOS Security
      • 8. iOS Lab Setup
      • 9. iOS Static Analysis
      • 10. iOS Dynamic Analysis
      • 11. iOS Bug Bounty
      • 🌐MAPT References
    • TCM - Practical Ethical Hacking
      • 1. Introduction & Networking
      • 2. Lab Set Up, Linux & Python
        • Intro to Kali Linux
        • Intro to Python
      • 3. The Ethical Hacker Methodology
        • Information Gathering
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • Capstone Practical Labs
      • 4. Active Directory
        • Active Directory Lab
        • AD - Initial Attack Vectors
        • AD - Post-Compromise Enumeration
        • AD - Post-Compromise Attacks
        • AD - Additional Attacks
        • AD - Case Studies
      • 5. Post Exploitation
      • 6. Web Application
        • Web App Lab Setup
        • Web App - SQL Injection
        • Web App - XSS
        • Web App - Command Injection
        • Web App - Insecure File Upload
        • Web App - Authentication Attacks
        • Web App - XXE
        • Web App - IDOR
        • Web App - Capstone Practical Lab
      • 7. Wireless Attacks
      • 8. Legal Documentation & Report Writing
      • 🌐PEH References
  • 🏠syselement's Blog Home
Powered by GitBook
On this page
  • Case study #1
  • Case study #2

Was this helpful?

Edit on GitHub
  1. Courses
  2. TCM - Practical Ethical Hacking
  3. 4. Active Directory

AD - Case Studies

PreviousAD - Additional AttacksNext5. Post Exploitation

Last updated 3 months ago

Was this helpful?

Case study #1

This case study details a penetration test conducted on a well-funded U.S. hospital with a strong security infrastructure, including IDS/IPS, CyberArk PAM, Symantec Endpoint Security, and proper patch management. Despite these defenses, testers found critical security gaps that could be exploited.

Key Findings:

  • SMB Relay Attack Exposure:

    • LLMNR/NBNS poisoning was mitigated, but SMB relay attacks were still possible

    • Attackers could use NTLM relaying to escalate privileges

  • Privilege Escalation Risks:

    • Misconfigurations and local users easy-reused hashes/passwords allowed privilege escalation, leading to potential Domain Admin access

    • Weak Active Directory hardening left high-value targets exposed

  • Security Investment ≠ Full Protection:

    • Even with expensive security solutions, configuration weaknesses left the network vulnerable

    • Lateral movement & persistence techniques were viable due to improper segmentation and overprivileged accounts

Key Takeaways:

  • Network segmentation & NTLM hardening are critical

  • Regular security assessments are needed despite high investment in security tools

  • Least privilege enforcement should be a priority to prevent escalation

This case study highlights how misconfigurations and overlooked weaknesses can lead to serious security risks, even in well-funded environments.


Case study #2

This case study outlines a penetration test on a well-funded U.S. hospital with solid security measures, including LLMNR/IPv6 disabled, SMB Signing enforced, IDS/IPS, and patched systems. Despite these controls, the assessment revealed critical security gaps that could be exploited.

Key Findings:

  • Default Credentials on Development Apps:

    • A development environment application was found using default credentials, granting unauthorized access.

    • Attackers could leverage this access to extract sensitive information.

  • Local Administrator Password Reuse:

    • The same local admin password was used across multiple machines.

    • Once a single system was compromised, lateral movement became trivial.

  • WDigest Enabled on Legacy Systems:

    • Older systems had WDigest enabled, storing plaintext credentials in memory.

    • Attackers could extract Domain Admin credentials using tools like Mimikatz.

  • Overprivileged Service Accounts:

    • Service accounts had Domain Admin privileges unnecessarily.

    • Compromising one of these accounts led to full domain compromise.

Key Takeaways:

  • Enforce unique local admin passwords across endpoints (LAPS).

  • Disable WDigest on all systems to prevent plaintext credential exposure.

  • Restrict service account privileges to the minimum necessary.

  • Regular security assessments are necessary, even with strong security investments.

This case highlights how misconfigurations and weak credential management can undermine otherwise strong defenses, making lateral movement and domain compromise easy for attackers.


AD Case Study #1 - You Spent How Much on Security? - TCM Security
AD Case Study #2 - #Pentest Tales #002: Digging Deep - TCM Security