DC01

Domain Controller (Root of Trust)
OS: Windows Server 2022
Role: PDC Emulator, Schema Master
IP: 192.168.56.10
Domain: cjcs.local
Status: COMPROMISED
DC01 is my opportunity to learn the Windows Server environment along with Active Directory. I created the domain structure and ensured DNS authority, and I gave the users, groups, and service accounts excessive permissions. These identity and access management vulnerabilities provide multiple paths for privilege escalation and persistence - as well as opportunities to learn how to defend against these attacks.

Critical Findings

🎟️ Service Principal Names

Weak service accounts registered with SPNs (mssql_svc) allow offline TGS cracking.

Impact: Kerberoasting

📝 SMB Signing Disabled

Signing is not enforced on the DC, allowing for NTLM relay attacks against the server itself.

Impact: Relay to DA

🔓 Weak Password Policy

Min password length of 7 with lockout threshold of 0.

Impact: Brute force target

Techniques (MITRE ATT&CK)

T1558.003 CRITICAL
Kerberoasting
Rubeus GetUserSPNs.py
T1003.006 CRITICAL
DCSync (Secretsdump)
Mimikatz Impacket
T1187 HIGH
Forced Authentication
PetitPotam Coercer