AD Enumeration থেকে শুরু করে Kerberoasting, Pass-the-Hash, DCSync, Golden Ticket — Active Directory Attack-এর সব কিছু এক জায়গায়।From AD Enumeration to Kerberoasting, Pass-the-Hash, DCSync, Golden Ticket — everything about Active Directory attacks in one place.
Active Directory (AD) হলো Microsoft-এর directory service যা Windows domain network-এ user, computer, policy সব কিছু centrally manage করে। ৯০%+ enterprise network-এ AD আছে — তাই AD হ্যাক করতে পারলে পুরো organization compromise হয়।Active Directory (AD) is Microsoft's directory service that centrally manages users, computers, and policies in Windows domain networks. Over 90% of enterprise networks use AD — so hacking AD can compromise the entire organization.
AD Forest: corp.local │ ├── Domain: corp.local │ ├── Domain Controller (DC) ← সবচেয়ে গুরুত্বপূর্ণ target! │ │ └── ntds.dit (সব user hash এখানে!) │ ├── Users: john, alice, svc_sql... │ ├── Computers: WS01, SERVER01... │ ├── Groups: Domain Admins, IT, HR... │ ├── OUs: Computers, Users, Servers... │ └── GPOs: Password Policy, Scripts... │ └── Child Domain: dev.corp.local (Trust relationship) Kerberos (Port 88) — Authentication Protocol LDAP (Port 389/636) — Directory Query SMB (Port 445) — File/Service Access RPC (Port 135) — Remote Procedure Call
| শব্দTerm | মানেMeaning | Security গুরুত্বSecurity Importance |
|---|---|---|
| Domain Controller (DC) | সব authentication পরিচালনা করেManages all authentication | CRITICAL TARGET |
| ntds.dit | AD database — সব user hash এখানেAD database — all user hashes here | CRITICAL |
| KRBTGT | Kerberos ticket তৈরির accountAccount for creating Kerberos tickets | Golden Ticket! |
| Domain Admin | সর্বোচ্চ privilege groupHighest privilege group | Ultimate goal |
| Service Account | Service চালানোর জন্য accountAccount for running services | Kerberoast target |
| ACL/ACE | Access Control — কে কী করতে পারেAccess Control — who can do what | Abuse করা যায় |
| GPO | Group Policy — সব machine-এ applyGroup Policy — applies to all machines | Persistence |
| SPN | Service Principal NameService Principal Name | Kerberoast signal |
Client KDC (DC) Service 1. AS-REQ ──────────► (username + timestamp, encrypted w/ password hash) ◄──── 2. AS-REP TGT (Ticket Granting Ticket) encrypted w/ KRBTGT hash 3. TGS-REQ ──────────► (TGT + SPN request) ◄──── 4. TGS-REP Service Ticket encrypted w/ Service Account hash ← Kerberoast এখানে! (offline crack) 5. AP-REQ ──────────────────────────────────► (Service Ticket) ◄────────────── 6. Access!
VMware / VirtualBox — Host-only Network: 192.168.56.0/24
┌──────────────────────────────────────────────────────┐
│ │
│ ┌─────────────────┐ ┌─────────────────────────┐ │
│ │ Windows Server │ │ Kali Linux │ │
│ │ 2019 / 2022 │ │ (Attacker) │ │
│ │ 192.168.56.10 │ │ 192.168.56.20 │ │
│ │ │ │ │ │
│ │ ● Domain: corp │ │ ● impacket │ │
│ │ ● DC role │ │ ● BloodHound │ │
│ │ ● AD DS │ │ ● CrackMapExec │ │
│ │ ● Users: 10+ │ │ ● PowerView │ │
│ └─────────────────┘ └─────────────────────────┘ │
│ │
│ ┌─────────────────┐ │
│ │ Windows 10 VM │ │
│ │ 192.168.56.11 │ (Victim Workstation) │
│ │ Domain joined │ │
│ └─────────────────┘ │
└──────────────────────────────────────────────────────┘
Get-NetUser | select description → Password in description!Password in description!Get-NetUser -SPN → Kerberoast target | -PreauthNotRequired → AS-REP targetGetNPUsers.py → hashcat -m 18200GetUserSPNs.py → hashcat -m 13100psexec.py -hashes :NTLM_HASHsekurlsa::logonpasswords → plaintext + hashplaintext + hashNetlogon authentication bypass — DC-র machine account password শূন্য করা যায়, তারপর DCSync!Netlogon authentication bypass — can zero out DC machine account password, then DCSync!
Print Spooler service-এ RCE → SYSTEM privilege। Low-priv user দিয়ে DA হওয়া যায়।RCE in Print Spooler service → SYSTEM privilege. Low-priv user can become DA.
Domain user → Domain Admin in one step! Machine account name manipulation।Domain user → Domain Admin in one step! Machine account name manipulation.
NTLM coercion — DC-কে attacker-এর কাছে connect করানো → NTLM relay → DA!NTLM coercion — force DC to connect to attacker → NTLM relay → DA!
Find-InterestingDomainAcl → Abuseable ACL খোঁজোFind abuseable ACLssecretsdump.py → সব hash — DA অথবা DCSync rights লাগবেAll hashes — needs DA or DCSync rights| Event ID | কী ঘটেছেWhat Happened | আক্রমণAttack |
|---|---|---|
| 4625 | Login failedLogin failed | Brute Force |
| 4648 | Explicit credential loginExplicit credential login | Pass-the-Hash |
| 4672 | Special privilege assignedSpecial privilege assigned | Privilege Escalation |
| 4688 | New process createdNew process created | Malicious execution |
| 4698 | Scheduled task createdScheduled task created | Persistence |
| 4720 | User account createdUser account created | Backdoor account |
| 4732 | Member added to security groupMember added to security group | Privilege Escalation |
| 4768 | Kerberos TGT requested | AS-REP Roasting |
| 4769 | Kerberos Service Ticket requested | Kerberoasting |
| 4771 | Kerberos pre-auth failed | Password spray |
| 4776 | NTLM authentication | Pass-the-Hash |
| 4662 | AD object accessed (DCSync!) | DCSync |
| Resource | ধরনType | বিষয়Topic |
|---|---|---|
| HackTheBox Pro Labs: RastaLabs | Lab | Real AD environment practiceReal AD environment practice |
| GOAD (Game of AD) | Lab | Vulnerable AD home labVulnerable AD home lab |
| TryHackMe — Holo / Throwback | Lab | AD-focused learning paths |
| CRTP Course (Nikhil Mittal) | Course | AD attack lab + cert |
| ired.team | Notes | Best free AD attack notesBest free AD attack notes |
| S1ren / TCM Security | YouTube | Free AD course |
| BloodHound Docs | Docs | BloodHound usage |
| impacket GitHub | Tool | All AD Python tools |
🏰 "In Active Directory, every misconfiguration is a path to Domain Admin."
এই ডকুমেন্ট সম্পূর্ণ শিক্ষামূলক উদ্দেশ্যে। সব সময় authorized lab বা pentest environment-এ practice করো। This document is entirely for educational purposes. Always practice in an authorized lab or pentest environment.
v1.0 — Active Directory Attack | Bilingual | Dark/Light Mode