Unmasking the Adversary: A Deep Dive into Active Directory Attack Techniques

Exploring the common and impactful methods used to exploit Active Directory and how to bolster your defenses.

Abstract network visualization

Microsoft Active Directory (AD) stands as the cornerstone of identity and access management for countless organisations globally, including a significant majority of Fortune 1000 companies. However, its extensive and often complex configuration means there isn't a "one-size-fits-all" secure setup, frequently leading to misconfigurations. This inherent complexity and its central role make AD a prime target for cybercriminals, who seek to steal sensitive data, disrupt crucial services, and ultimately gain full control over an organisation's network – effectively obtaining the "keys to the kingdom".

For cybersecurity professionals, whether they are blue team members focused on defence or red team members conducting audits, understanding how Active Directory operates and how it can be exploited is paramount. This post will unpick some of the most common and impactful Active Directory attack methods, explaining why adversaries employ them and providing key takeaways for both understanding and bolstering your defences.

Active Directory Attacks and Mitigation Table

# Attack Technique Description Top Mitigations
1LLMNR/NBT-NS PoisoningSpoofing name resolution to capture NTLM hashesDisable LLMNR/NBT-NS; use strong passwords; monitor responder-like behavior
2Password SprayingTrying common passwords across many users to avoid lockoutsEnforce strong password policies; implement MFA; monitor failed logins
3Pass-the-Hash (PtH)Using NTLM hashes for lateral movement without knowing plaintext passwordDisable WDigest; restrict admin logins; use LAPS; patch systems
4KerberoastingRequesting service tickets and cracking them offlineUse complex service account passwords; prefer GMSAs; monitor Event ID 4769
5DCSync / NTDS.dit ExtractionSimulating DC replication to pull password hashesRestrict “Replicating Directory Changes” rights; monitor for DCSync behavior
6Golden TicketForging TGTs using stolen KRBTGT hashReset KRBTGT password twice post-compromise; rotate KRBTGT periodically; log abnormal ticket behaviors
7Token ImpersonationHijacking access tokens from memory to impersonate usersTiered administration; prevent admins from logging into low-privilege machines; clear tokens with reboots
8GPP Cpassword AttackDecrypting hardcoded passwords from legacy Group Policy preferencesDelete groups.xml files; patch MS14-025; audit SYSVOL for sensitive files

1. LLMNR/NBT-NS Poisoning

Network cables plugged into a switch

What it is

Local Loop Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Windows networking functions designed for name resolution without the need for a Domain Name System (DNS) server. Attackers exploit these by intercepting multicast packets that ask for a hostname's IP address and then, using tools like Responder, responding as if they are the legitimate target, redirecting the network traffic.

Why it's used

This technique allows attackers to obtain sensitive information, including IP addresses, usernames, and password hashes. These captured hashes can then be subjected to offline cracking or used directly in relay attacks to authenticate as the victim. Notably, this attack can be initiated without any prior authentication if an attacker can gather a list of users. It's frequently described as an "easy win" for attackers if an organisation hasn't addressed it.

Key Takeaways

  • Look for any machine that is not a domain controller responding to name queries in LLMNR traffic.
  • Monitor for NTLM authentication packets that are directed towards unidentified or unknown machines.
  • Be aware of typos in LLMNR, DNS, and SMB traffic, as these are common triggers for such attacks.
  • The most effective mitigation is to entirely disable LLMNR and NBT-NS if they are not essential within your environment.
  • If disabling isn't feasible, consider implementing Network Access Control (NAC).
  • Always enforce robust, complex passwords (ideally 14 characters or longer) to significantly slow down hash cracking attempts.

2. Password Spraying

Login screen on a laptop

What it is

Unlike traditional brute-force attacks that target a single account with numerous password attempts, password spraying involves testing a single, common password across a large number of accounts. Tools like Kerbrute are frequently employed for this purpose.

Why it's used

This method is favoured by attackers because it helps to evade account lockout policies that are designed to thwart brute-force attacks, thereby allowing the attacker to remain undetected for longer. A successful "hit" from a password spray can provide an immediate foothold, enabling further enumeration and attacks within Active Directory.

Key Takeaways

  • Enforce a minimum password policy of at least 12 characters, with recommendations often extending to 14 or more for enhanced security.
  • Implement multi-factor authentication (MFA) wherever possible, as it significantly reduces the risk of account compromise even if credentials are leaked or stolen.
  • Continuously monitor failed login attempts for unusual patterns.
  • Prohibit the use of common passwords or patterns that relate to business names, domain names, or personal information.

3. Pass-the-Hash (PtH) with Mimikatz

Code on a laptop screen

What it is

Pass-the-Hash is a technique where an attacker authenticates to a remote server or service using a stolen password hash (specifically, an NTLM hash) rather than the cleartext password itself. Mimikatz is a powerful and widely recognised open-source tool that facilitates this by extracting credentials, including hashes, from the memory of Windows systems (e.g., the LSASS process).

Why it's used

PtH allows for lateral movement and privilege escalation across a network without the need to crack the stolen password hashes into plaintext. This is often enabled when IT professionals, through their regular duties, inadvertently leave privileged account hashes in system memory by logging into user machines or using Remote Desktop Protocol (RDP).

Key Takeaways

  • Apply relevant Microsoft patches and disable the WDigest protocol to prevent plaintext passwords from being stored in the Local Security Authority Subsystem Service (LSASS) memory.
  • Deploy Microsoft LAPS (Local Administrator Password Solution). This is crucial for ensuring that local administrator passwords are random and unique across all endpoints, significantly hindering lateral movement.
  • Reduce the number of services running with local administrator privileges, as administrator rights are generally required for tools like Mimikatz to access and dump credentials from memory.
  • Enforce SMB signing across the domain to prevent the interception and relaying of NTLM authentication messages.
  • Utilise Privileged Access Workstations (PAWs) for administrators. These dedicated, secure workstations prevent privileged credentials from residing on less secure user machines.

4. Kerberoasting

A dog that looks like the mythical three-headed Cerberus

What it is

Kerberoasting is a post-exploitation technique where attackers target service accounts within Active Directory by requesting a Kerberos Service Ticket (TGS) for a registered Service Principal Name (SPN). The requested TGS is encrypted using the SPN's associated password hash, which the attacker can then extract and attempt to brute-force offline to recover the cleartext password. Common tools for this attack include Impacket's GetUserSPNs and Rubeus.

Why it's used

Service accounts are attractive targets because they often have weak, easily guessable, or infrequently changed passwords. If a compromised service account happens to hold elevated privileges (such as being a member of a privileged group), gaining its password can lead directly to domain dominance.

Key Takeaways

  • Enforce long and complex passwords (at least 25 characters) for all service accounts.
  • For privileged services, consider implementing Group Managed Service Accounts (GMSAs). These accounts automatically manage and rotate complex passwords, significantly enhancing security.
  • Regularly identify and remove any unused service accounts.
  • If your environment supports it, disable RC4 encryption for Kerberos and enforce the use of stronger AES algorithms.
  • Monitor domain controller logs for Event ID 4769. Specifically, look for events where the "Ticket Encryption Type" is 0x17 (RC4), and the account name does not end with a $, as this often indicates a user account request.

5. NTDS.dit Extraction / DCSync

Server room with racks of servers

What it is

Active Directory stores all domain information, including highly sensitive user password hashes, within the NTDS.dit file, located by default at %SystemRoot%\ntds\ on a domain controller. Attackers who achieve administrator access to the domain controller can extract this file. DCSync is a specific feature within tools like Mimikatz that simulates the behaviour of a legitimate domain controller to request and retrieve password data through standard domain replication protocols.

Why it's used

The primary goal is to obtain all user password hashes for offline cracking or to perform Pass-the-Hash attacks. This allows attackers to operate independently of the Active Directory environment once the file is exfiltrated. DCSync attacks are particularly insidious as they mimic legitimate replication traffic, making them more difficult to detect.

Key Takeaways

  • Minimise the number of accounts with logon privileges on domain controllers.
  • Implement strict physical access controls for domain controller machines.
  • Securely protect Active Directory database backups and virtual machine clones through encryption and access controls.
  • Exercise extreme caution when delegating "Replicating Directory Changes" rights, as these permissions are frequently abused.
  • Enable comprehensive logging for domain controllers and ensure logs are monitored.

6. Golden Ticket Attacks

A golden ticket

What it is

A Golden Ticket is a forged Kerberos Ticket Granting Ticket (TGT). It is created using the stolen NT hash of the KRBTGT account, which is the special Kerberos ticketing account. Once created, this forged TGT grants an attacker complete access to any resource or system within the entire domain. Mimikatz is the primary tool used to generate and inject these golden tickets.

Why it's used

This attack provides highly persistent, stealthy, and extensive access across the entire domain. Golden tickets can be generated offline, assigned an arbitrary lifetime (defaulting to 10 years), and resetting the password of the impersonated account does not invalidate the ticket.

Key Takeaways

  • The absolute top priority is to protect the KRBTGT account.
  • Regularly reset your KRBTGT account password at least once a year, and immediately after a potential compromise. It is critical to use Microsoft's official scripts for this process. Resetting the password twice invalidates its entire password history.
  • Minimise the number of accounts with highly privileged access, such as Domain Admins, Virtual Infrastructure Admins, and Backup Admins.
  • Be aware that Windows event logs do not inherently distinguish between legitimate and forged TGTs, making direct detection challenging. However, anomalies in certain event IDs might indicate their use.

7. Token Impersonation

Theatrical masks

What it is

When an attacker gains a shell on a machine, they can use tools, such as the Incognito module within Metasploit, to impersonate existing delegate tokens found in the system's memory. Delegate tokens are created when a user logs onto a machine or establishes an RDP session.

Why it's used

This attack is highly effective if a domain administrator has logged into a compromised machine. Their delegate token may persist in memory until the machine is rebooted, allowing the attacker to impersonate them and inherit their privileges, facilitating significant privilege escalation and lateral movement.

Key Takeaways

  • Implement strict account tiering: Domain administrators should strictly limit their logins to only domain controllers and other high-security administrative hosts.
  • Restrict local administrator access: If end-users are not local administrators on their machines, it becomes significantly harder for an attacker to perform token impersonation.
  • Encourage regular machine reboots to clear tokens from memory, reducing the window of opportunity for attackers.

8. Group Policy Preferences (GPP) / Cpassword Attacks

Structured code similar to XML

What it is

Historically, Group Policy Preferences (GPP) allowed administrators to embed encrypted credentials, known as Cpassword, within XML documents stored in the sysvol folder of Active Directory. A critical vulnerability arose when the encryption key for these Cpasswords was publicly released.

Why it's used

While this vulnerability (MS14-025) has since been patched, if an administrator configured GPP credentials before the patch was applied, the encrypted passwords remain vulnerable. These credentials often belong to domain administrator accounts, offering a direct path to high-level access, as any domain user typically has read access to the sysvol folder.

Key Takeaways

  • Proactively search for and remove any groups.xml files within the sysvol folder that contain Cpassword entries.
  • Ensure that all policies which might have stored embedded credentials prior to the MS14-025 patch are thoroughly remediated.
  • Utilise specific tools like Metasploit's smb_enum_gpp module or PowerShell scripts to scan for this vulnerability.

Conclusion

Active Directory's fundamental role in identity and access management means its security is non-negotiable. Adversaries continuously exploit both common misconfigurations and inherent features of AD to achieve their objectives. Therefore, implementing a layered and proactive approach to security is paramount.

Organisations should prioritise:

  • Enforcing strong, complex, and regularly changed password policies for all accounts, especially privileged ones.
  • Adhering strictly to the principle of least privilege, ensuring users and service accounts only have the minimum necessary permissions.
  • Implementing robust monitoring and alerting mechanisms to detect suspicious activity, such as unusual login attempts or changes to sensitive objects.
  • Conducting regular security audits and penetration tests (like red team exercises) to identify and remediate weaknesses before malicious actors can exploit them.

By understanding these prevalent attack vectors and implementing comprehensive defensive strategies, organisations can significantly enhance their Active Directory security posture and cyber resilience.

Join the Discussion

💬 Have you encountered AI exploits?

🛡️ Which mitigation strategy is most effective?

🔗 Share your thoughts in the comments!

Back to Blog Posts