Skip to content

AD Auditing

Creating an AD Snapshot with Active Directory Explorer

  • AD Explorer can also be used to save snapshots of an AD database for offline viewing and comparison. We can take a snapshot of AD at a point in time and explore it later, during the reporting phase, as you would explore any other database. It can also be used to perform a before and after comparison of AD to uncover changes in objects, attributes, and security permissions.

PingCastle

  • https://www.pingcastle.com/documentation/
  • eval the security posture of the AD env
  • returns maps and graphs
  • different from tools such as PowerView and BloodHound because, aside from providing us with enumeration data that can inform our attacks, it also provides a detailed report of the target domain's security level using a methodology based on a risk assessment/maturity framework - https://en.wikipedia.org/wiki/Capability_Maturity_Model_Integration

Running PingCastle

  • PingCastle.exe
    • drops into a Terminal user Interface (TUI) - interactive mode
  • default option -> healthcheck run,
    • will establish a baseline overview of the domain,
    • provide information to deal with misconfigurations and vulnerabilities.
  • Creates an html report

Group3r

  • Group Policy auditing to find vulns
  • must be run from a domain-joined host with a domain user
    • runas /netonly
  • group3r.exe -f <filepath-name.log>
    • either -s or -f : stdout or save to file
    • OUTPUT -> each indentation is a different level,
      • so no indent will be the GPO,
      • one indent will be policy settings,
      • and another will be findings in those settings.

ADRecon

  • Not stealthy
  • https://github.com/adrecon/ADRecon\
  • .\ADRecon.ps1
  • will create HTML and CSV reports
  • For Group Policy, the host you run from should have the GroupPolicy PowerShell module installed