Active Directory (AD) is Microsoft's directory service that manages users, computers, and resources in Windows networks. Understanding AD is essential for enterprise penetration testing - it's the backbone of 95% of Fortune 500 companies!
AD was introduced with Windows 2000 and remains the dominant enterprise identity management system. Even with cloud adoption, hybrid environments mean AD skills remain critical.
AD Structure
Domain Naming
Domain names follow DNS format (corp.local, company.com). The ".local" suffix is common in internal networks. Full name with domain is "DOMAIN\username" or "username@domain.local".
AD Objects
Authentication
NTLM Authentication
Kerberos Authentication
Understanding Kerberos is crucial for AD attacks. Most enterprise penetration tests involve Kerberoasting or other ticket-based attacks.
AD Enumeration
BloodHound
BloodHound visualizes AD relationships and attack paths. It's the fastest way to find paths to Domain Admin. Always run it during AD engagements!
Common AD Attacks
Essential AD Tools
Knowledge Check
Key Takeaways
- AD manages users, computers, and resources in Windows networks
- Kerberos is ticket-based; NTLM uses challenge-response
- Kerberoasting and AS-REP Roasting target weak service account passwords
- BloodHound visualizes attack paths to high-value targets
- Domain Admins control one domain; Enterprise Admins control the forest
- Compromising the krbtgt hash enables Golden Ticket persistence