VulnAD consists of easy PowerShell scripts to build vulnerable ActiveDirectory environment for pentesting.
Each example under examples/
is a scenario of a vulnerable AD environment.
To setup the environment, install the VMs which are described in the README.md and run the corresponding script.
Take example 1 as an example, the steps are:
- Install the VMs which is described in
examples/1/README.md
- Clone this repo to everyone VM
- Modfiy and execute the corresponding script on each VM, e.g. install
examples/1/dc01.ps1
on the VM that you want it to bedc01
. - Attack it!
Also, a script might reboot several times and require you to manually run it again. The script will display "Installation Success" once you complete installing it. The installation order for the VMs is important. e.g. You cannot join a computer to the domain that hasn't configured yet, right? Please read the corresponding README.md carefully.
You can practice/experiment the following techniques in the example lab:
- Lateral Movement
- Credential Dumping
- Pass the Hash
- Pass the Ticket
- Over Pass the Hash
- Kerberoasting
- AS-REP Roasting
- Unconstrained Delegation
- Constrained Delegation
- Resource-Based Constrained Delegation
- Golden Ticket
- Silver Ticket
- DCSync
- Skeleton Key Attack
- DSRM Abuse
- Custom SSP
- ACLs Abuse
- SID History Attack