When a user logs in - sys creates an access token for the user with its SID, the rights granted, SIDs for any group that the user is a member of.
SID token is used to check rights while performing an action
Distinguished Name (DN)
Relative Distinguished Name (RDN)
sAMAccountName
user's logon name.
bjones in the above case
userPrincipalName
id users in an AD
bjones@inlanefrieght.local
FSMO Roles
Flexible Single Master Operation
Global Catalog
domain controller that stores copies of objects of all AD forest
performs auth
allows object search within the forest
Read-Only Domain Controller
read-only AD DB
Replication
transfer from one DC to another
Service Principal Name (SPN)
uniquely id a service instance
Group Policy Object (GPO)
collect policy settings
Access Control Lists (ACLs)
collection of ACEntries that apply to an object
ACE
maps a trustee(user, comp) to its access rights
Discretionary Access Control (DACL)
define which security principals are granter or denied access to an object
list of ACEs
If no DACL - full access
If no ACE in the DACL - no access
System Access Control Lists (SACL)
log access attempts to secured objects
Fully Qualified Domain Name
[hostname].[domain name].[tld]
eg: DC01.inlanefrieght.local
can use fqdn instead of an IP in the AD
Tombstone
container object that holds deleted objects
deleted obj stays for a tombstone lifetime
attributes lost cannot be recovered
AD Recycle Bin
SYSVOL
public files - system policies, group policy settings,s cripts
AdminSDHolder
manage ACLs for privileged built-in groups
SDProp (SD Propagator) process runs every hour to check hte ACLs on protected groups
dsHeuristics
define multiple forest-wide configs
If a group is excluded via the dsHeuristics attribute, then any changes that affect it will not be reverted when the SDProp process runs.
admin Count
if 1, user is protected
if 0, not protected
from the SDProp process
target the user set to 1
Active Directory Users and Computers (ADUC)
ADUC is a GUI console commonly used for managing users, groups, computers, and contacts in AD.
Changes made in ADUC can be done via PowerShell as well.
sIDHistory
holds SIDs than an object had previously
used in migrations
NTDS.DIT
Stored on an AD at C:\Windows\NTDS
Important for POST-EXPLOITATION
If the setting Store password with reversible encryption is enabled, then the NTDS.DIT will also store the cleartext passwords for all users created or who changed their password after this policy was set.
MSBROWSE
provide browsing services
In older version of Windows we could use nbtstat -A ip-address to search for the Master Browser. If we see MSBROWSE it means that's the Master Browser. Aditionally we could use nltest utility to query a Windows Master Browser for the names of the Domain Controllers.