Active Directory Attack Lab: Recon-to-Root

This step-by-step lab walks you through real-world AD attack techniques—starting with port scans and ending in full domain compromise using tools like nmap, kerbrute, evil-winrm, and BloodHound. Perfe

Active Directory Lab Overview

Key Activities

  • Service Enumeration

  • Exploit misconfigurations and weak credentials

  • Abusing Active Directory features for full control

Tools We'll Use

  • Reconnaissance: Nmap

  • Enumeration: smbclient, ldapsearch, kerbrute

  • Exploitation: netxexc, evil-winrm

  • Privilege Escalation: ldapdomaindump, BloodHound, winPEAS

  • Post-Exploitation: Windows CLI, RPC Commands

Note: All required files and tools for this lab are preloaded and can be found on the kali Desktop

Attacker IP: 10.0.15.99                                                                                         
Target IP: 192.168.10.4

Last updated