๐Ÿ“š Learning Objectives

By the end of this lesson, you will be able to:

๐ŸŽฏ Assessment Methodology

Assessment Phases

๐Ÿ“‹ Phase 1: Planning & Reconnaissance

Activities:
  • Scope definition and authorization
  • Information gathering
  • Tool preparation
  • Baseline establishment

๐Ÿ” Phase 2: Enumeration

Activities:
  • Domain architecture analysis
  • User and group enumeration
  • Computer and service discovery
  • Trust relationship mapping

โšก Phase 3: Vulnerability Assessment

Activities:
  • Configuration analysis
  • Permission auditing
  • Policy evaluation
  • Weakness identification

๐ŸŽฏ Phase 4: Exploitation Testing

Activities:
  • Privilege escalation testing
  • Lateral movement validation
  • Persistence mechanism testing
  • Impact assessment

๐Ÿ“Š Phase 5: Reporting & Remediation

Activities:
  • Finding prioritization
  • Report generation
  • Remediation recommendations
  • Follow-up planning

๐Ÿ” Comprehensive Assessment Checklist

Domain Architecture Assessment

๐Ÿ—๏ธ Infrastructure Analysis

๐Ÿ‘ฅ Account Security Review

๐Ÿ” Permission Analysis

Security Configuration Assessment

๐Ÿ›ก๏ธ Group Policy Security

๐Ÿ”‘ Authentication Security

๐Ÿ“Š Monitoring & Logging

๐Ÿงช Hands-On Exercise

Exercise: Complete Active Directory Security Assessment

Objective: Perform a comprehensive AD security assessment using the methodology learned in this module.

๐Ÿ“‹ Assessment Steps:

  1. Domain Enumeration
    # Domain information gathering
    Get-ADDomain | Select-Object Name, Forest, DomainMode
    Get-ADForest | Select-Object Name, ForestMode, SchemaMaster
    
    # FSMO role identification
    netdom query fsmo
    Get-ADForest | Select-Object SchemaMaster, DomainNamingMaster
    Get-ADDomain | Select-Object PDCEmulator, RIDMaster, InfrastructureMaster
                                
  2. User and Group Analysis
    # Privileged group enumeration
    Get-ADGroup -Filter "Name -like '*admin*'" | Select-Object Name, SID
    Get-ADGroupMember -Identity "Domain Admins" | Select-Object Name, SamAccountName
    
    # Service account identification
    Get-ADUser -Filter "ServicePrincipalName -like '*'" -Properties ServicePrincipalName
                                
  3. GPO Security Assessment
    # GPO enumeration
    Get-GPO -All | Select-Object DisplayName, Id, CreationTime
    
    # GPO permission review
    Get-GPPermission -Name "Default Domain Policy" -All
    
    # Credential search
    Get-ChildItem \\domain.com\SYSVOL\domain.com\Policies\*\ -Recurse | Select-String "cpassword"
                                
  4. Trust Relationship Analysis
    # Trust enumeration
    Get-ADTrust -Filter * | Select-Object Name, Direction, TrustType
    
    # Trust security analysis
    Get-ADTrust -Filter * | Select-Object Name, SelectiveAuthentication, SIDFilteringForestAware
                                

๐Ÿ“„ Deliverables:

  • Comprehensive assessment report
  • Vulnerability findings with risk ratings
  • Remediation recommendations
  • Executive summary
  • Technical appendix

๐Ÿ“Š Knowledge Check

Question 1: What is the first phase of an AD security assessment?

Question 2: Which command identifies FSMO role holders?

๐Ÿ“ง Stay Updated with New Lessons

Get notified when we add new lessons and expert content!