Top 10 Active Directory Attacks and their methodologies

Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.

Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.

Thursday, 25 April, 2024

Active Directory
Active Directory
Active Directory

In our previous blog, we delved into Active Directory, its functionality, and significance. Now, let's explore the Top 10 Active Directory Attacks and their methodologies.

                      Top 10 Active Directory (AD) Attacks

1. Password Spraying.                    6. DCShadow Attacks.
2. Pass-the-Hash (PtH) Attacks.          7. DCSync Attacks.
3. Kerberoasting.                        8. BloodHound Exploitation.
4. Golden Ticket Attacks.                9. Remote Code Execution Exploits.
5. Silver Ticket Attacks.               10. Domain Trust Exploitation

  1. Password Spraying:

Attackers try a small set of commonly used passwords against multiple user accounts to evade detection.

  1. Pass-the-Hash (PtH) Attacks:

Attackers use stolen hashed credentials to authenticate to systems and services, bypassing the need for plaintext passwords.

  1. Kerberoasting Attacks:

Attackers target Kerberos ticket-granting tickets to extract password hashes of domain user accounts, which can be cracked offline.

  1. Golden Ticket Attacks:

Attackers forge Kerberos tickets with unlimited access privileges, granting persistent access to domain resources. 

Methodology:

Attackers gain initial access to the domain controller to extract the NTLM hash of the KRBTGT account, allowing them to create valid Kerberos tickets with arbitrary group memberships and privileges.

  1. Silver Ticket Attacks:

Similar to golden ticket attacks, attackers forge Kerberos tickets for specific services to access targeted resources without domain controller authentication. 

Methodology:

Attackers gain access to a service account's NTLM hash to create forged Kerberos tickets, granting access to specific services without authentication.

  1. DCShadow Attacks:

Attackers modify Active Directory objects, injecting changes that replicate to other domain controllers, compromising directory service integrity. 

Methodology:

Attackers use Mimikatz or other tools to inject malicious changes into the Active Directory database, which are then replicated to other domain controllers.

  1. DCSync Attacks:

Attackers impersonate domain controller replication requests to retrieve password data from Active Directory objects, extracting sensitive information like password hashes. 

Methodology:

Attackers use Mimikatz or other tools to simulate domain controller replication requests, allowing them to retrieve password data without alerting security mechanisms.

  1. BloodHound Exploitation:

Attackers utilize BloodHound, a tool for AD reconnaissance, to identify and exploit security vulnerabilities within Active Directory environments. 

Methodology:

Attackers perform reconnaissance to identify vulnerable user accounts, group memberships, and trust relationships, leveraging this information to escalate privileges and move laterally within the network.

  1. Remote Code Execution (RCE) Exploits:

Attackers exploit vulnerabilities in AD-related software to remotely execute arbitrary code, compromising domain controller security. 

Methodology:

Attackers identify and exploit vulnerabilities in AD-related software or services, gaining unauthorized access to domain controllers and compromising their security.

  1. Domain Trust Exploitation:

Attackers exploit insecure trust relationships between domains to gain unauthorized access across domains, facilitating lateral movement and privilege escalation. 

Methodology:

Attackers exploit weak or misconfigured trust relationships between domains to gain unauthorized access to resources in trusted domains, allowing them to move laterally and escalate privileges within the network.

Happy Learning !!