email info@BC-Security.org

Top Categories

Spotlight

todayOctober 10, 2024

Offensive Security Tools Cx01N

Not Your Grandfather’s Empire

Not Your Grandfather’s Empire I’ve wanted to put this blog together since returning home from DEFCON. Anytime we ran into someone who recognized our swag, they mentioned how much they loved Empire back in the day and didn’t realize it was being actively maintained. This made me reflect on all [...]


Coming Soon

Advanced Threat Emulation: Active Directory

April 10, 2025my_locationIn-Person & Virtual

Background
share close
Details
Date April 10, 2025 H 08:00
End April 11, 2025 H 17:00
Location In-Person & Virtual
Address TREX Coworking Space, 911 Washington Ave #500, St. Louis, MO 63101
Add to Google Calendar

Click here to add this event to your google calendar

About the event

Course Summary

Are you ready to become an expert at attacking Active Directory? This training course covers various aspects of Active Directory and how to attack it. Students will learn about network poisoning and authentication protocols in Windows networks, the different kinds of Windows credential types, and how to use them. Students will also learn common attacks on NTLM and Kerberos, such as NTLM relay attacks, delegation attacks, and creating forged tickets. Students will become familiar with identifying and exploiting common Active Directory misconfigurations with tools like Bloodhound, Rubeus, Impacket, and Mimikatz. Students will have the opportunity to conduct attacks from both Windows and Linux operating systems and learn the nuances between each platform for performing attacks. Students will learn where credentials are stored on a Windows systems and how to extract credentials from LSASS, DPAPI, SAM, LSA, and the Kerberos ticket cache. Students will learn about the different domain trusts and how to perform multi-domain compromises. Finally, students will put all their skills to the test in a course lab that contains multiple attackable domain-joined Windows systems.

Course Schedule

Day 1:

Introduction to Active Directory

  • Users and Groups
  • Understanding the Domain Controller
  • Enumeration with ADExplorer
  • Enumeration with ldapdomaindump
  • Bloodhound

Name Resolution on Windows

  • Default Name resolution search order
  • Responsible Poisoning
  • LLMNR/NetBIOS Poisoning
  • DHCPv6 Poisoning
  • ARP Spoofing
  • ADIDNS Poisoning

Attacking the NTLM protocol

  • Authenticating with NTLM
  • Hash capture and password recovery
  • Weaknesses in NTLMv1
  • NTLM Relay
  • Coerced Authentication

Credential Dumping

  • SAM
  • LSA
  • LSASS
  • DPAPI
  • NTDS.dit (DCSync)

Day 2:

Attacks on Kerberos

  • Authenticating with Kerberos
  • Kerberoast
  • Silver Tickets
  • Golden Tickets
  • SNAME Substitution

Delegation

  • Unconstrained Delegation
  • Constrained Delegation
  • Resource-based Constrained Delegation

Domain Trusts

  • Types of Trusts
  • Trust Functionality
  • Enumerating Trusts
  • Attacking Intra-Forest Trusts
  • Attacking Iter-Forest Trusts

Course Objectives

  • Understand the use and employment of Active Directory
  • Demonstrate Active Directory attacks and concepts

What Students Will Be Provided With

  • 30-day lab access on Immersive Labs
  • A copy of all course material
  • Course swag & coin

Student Requirements

  • Intermediate knowledge of Offensive Security Tools
  • Basic familiarity with Active Directory concepts
  • Willingness to learn in a fast-paced environment

Hardware Requirements

  • Laptop with 8GB of RAM
  • Modern Web Browser (Chrome, Firefox, etc)
Rate it