Active Directory Enumeration Auth Flashcards

(12 cards)

1
Q

You have domain user creds. What’s your first AD enumeration deliverable?

A

A clear map of users/groups/computers and at least one plausible escalation path (from BloodHound/manual enum).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SharpHound collection is blocked by policy. What’s next?

A

Switch to manual enum using built-in commands/PowerShell and target specific questions (who has admin where?).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You identify SPNs for service accounts. What attack does that enable?

A

Kerberoasting: request service tickets and crack offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Password spraying is tempting. What should you confirm first?

A

Lockout policy and permitted testing scope; keep guesses minimal to avoid lockouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BloodHound shows user has GenericWrite on another user. What does that imply?

A

Potential to modify that user (e.g., reset password or add key/attrs) depending on rights and constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You find a GPP cpassword in SYSVOL. What’s the correct action?

A

Decrypt/recover the password and use it to pivot/escalate, then document evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerberos vs NTLM: why does it matter for attacks?

A

Ticket vs hash workflows change feasible credential abuse techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You find a domain share with scripts for backups. What are you looking for?

A

Credentials, service accounts, and hostnames that reveal admin workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have a foothold on a domain-joined host. What’s a key next step?

A

Identify domain context, logged-on users, and reachable domain services; then attack path plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You see an account with ‘Do not require Kerberos preauthentication’. What might that allow?

A

AS-REP roasting: offline cracking of AS-REP responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You need to validate creds from a non-domain-joined box. What’s the general approach?

A

Attempt authenticated access to domain services (SMB/LDAP/WinRM) to confirm validity without lockouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your goal is Domain Admin. What’s the best mindset?

A

Don’t chase random exploits—follow the shortest validated privilege path from your current node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly