RT/BT – Active Directory enumeration and ACL exploitation for privilege escalation – Part 2

It’s been a while since I last posted, I’ve been busy with personal things, but I want to retake sharing things I know about Active Directory exploitation. We’ll continue adding misconfigurations to our Active Directory environment, to further explore ACL exploitation paths. We’ll add a new domain user, max.power in Continue Reading

RT/BT – Active Directory enumeration and ACL exploitation for privilege escalation – Part 1

In this post we will use different tools to analyze an Active Directory environment, both from Linux and Windows. This post is useful for both Pentesters and Blue Team members, as it identifies possible attack vectors and insecure configurations on a domain. Both to exploit from the attacker’s side, and Continue Reading

RT – Active Directory basic scenario

Continuation of the previous post, where we’ll start configuring a vulnerable environment to learn how to escalate privileges within an Active Directory scenario abusing insecure configurations. REQUIREMENTS: We’ll start our scenario configuration by adding new local administrator accounts for the two Windows hosts “ATENCION01” and “TECNOLOGIA01”. We login with an Continue Reading