Enumerating Active Directory

This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.

Enumerating Active Directory

Task 1: Why AD Enumeration

Q1: I have completed the Breaching AD network and am ready to learn about AD enumeration techniques.

1.1_1

1.1_2

1.1_3

1.1_4

1.1_5

Ans1: No answer needed

Q2: I have connected to the network and configured DNS.

Ans2: No answer needed

Q3: I have requested my credential pair from the distributor and verified that I can RDP and SSH into THMJMP1.

Ans3: No answer needed

Task 2: Credential Injection

Q1: What native Windows binary allows us to inject credentials legitimately into memory?

Ans1: runas.exe

Q2: What parameter option of the runas binary will ensure that the injected credentials are used for all network connections?

Ans2: /netonly

Q3: What network folder on a domain controller is accessible by any authenticated AD account and stores GPO information?

Ans3: SYSVOL

Q4: When performing dir \za.tryhackme.com\SYSVOL, what type of authentication is performed by default?

Ans4: Kerberos Authentication

Task 3: Enumeration through Microsoft Management Console

Q1: How many Computer objects are part of the Servers OU?

3.1_1

3.1_2

3.1_3

3.1_4

3.1_5

3.1_6

3.1_7

3.1_8

3.1_9

3.1_10

3.1_11

3.1_12

3.1_13

Ans1: 2

Q2: How many Computer objects are part of the Workstations OU?

3.2_1

Ans2: 1

Q3: How many departments (Organisational Units) does this organisation consist of?

3.3_1

Ans3: 7

Q4: How many Admin tiers does this organisation have?

3.4_1

Ans4: 3

Q5: What is the value of the flag stored in the description attribute of the t0_tinus.green account?

3.5_1

Ans5: THM{Enumerating.Via.MMC}

Task 4: Enumeration through Command Prompt

Q1: Apart from the Domain Users group, what other group is the aaron.harris account a member of?

4.1_1

Ans1: Internet Access

Q2: Is the Guest account active? (Yay,Nay)

4.2_1

Ans2: Nay

Q3: How many accounts are a member of the Tier 1 Admins group?

4.3_1

Ans3: 7

Q4: What is the account lockout duration of the current password policy in minutes?

4.4_1

Ans4: 30

Task 5: Enumeration through PowerShell

Q1: What is the value of the Title attribute of Beth Nolan (beth.nolan)?

5.1_1

Ans1: Senior

Q2: What is the value of the DistinguishedName attribute of Annette Manning (annette.manning)?

5.2_1

Ans2: CN=annette.manning,OU=Marketing,OU=People,DC=za,DC=tryhackme,DC=com

Q3: When was the Tier 2 Admins group created?

5.3_1

Ans3: 2/24/2022 10:04:41 PM

Q4: What is the value of the SID attribute of the Enterprise Admins group?

5.4_1

Ans4: S-1-5-21-3330634377-1326264276-632209373-519

Q5: Which container is used to store deleted AD objects?

5.5_1

Ans5: CN=Deleted Objects,DC=za,DC=tryhackme,DC=com

Task 6: Enumeration through Bloodhound

Q1: What command can be used to execute Sharphound.exe and request that it recovers Session information only from the za.tryhackme.com domain without touching domain controllers?

6.1_1

6.1_2

6.1_3

6.1_4

6.1_5

6.1_6

6.1_7

6.1_8

Ans1: Sharphound.exe –CollectionMethods Session –Domain za.tryhackme.com –ExcludeDCs

Q2: Apart from the krbtgt account, how many other accounts are potentially kerberoastable?

6.2_1

Ans2: 4

Q3: How many machines do members of the Tier 1 Admins group have administrative access to?

6.3_1

Ans3: 2

Q4: How many users are members of the Tier 2 Admins group?

6.4_1

Ans4: 15

Task 7: Conclusion

Q1: I understand AD enumeration and how we can possibly detect malicious AD enumeration.

Ans1: No answer needed