top of page
Attacking Active Directory with Linux (LinuxAD)

Attacking Active Directory with Linux Lab Objective:

Attacking Active Directory with Linux (LinuxAD) is a training environment and playground. Students get access to dedicated lab setup (not shared with other students).

The lab contains a Linux based machine to execute attacks and a target AD setup. The target AD is a fully patched AD environment with all Server 2019 machines.

Students can practice techniques like network discovery, enumeration, abusing file shares, bypassing AMSI and Windows Defender, metasploit payloads, domain enumeration, credentials spraying and reuse, extracting secrets, testing LOLBAS, evading application whitelisting, SQL Server abuse, pivoting, ACL abuse, exploiting delegation, domain privilege escalation and more!

Attacking Active Directory with Linux (LinuxAD)

There are 30 flags to capture across various categories. The flags help in further understanding key concepts like credentials storage in Windows, local privilege escalation, application whitelisting enumeration, extracting secrets from SQL Server, WMI permanent events, manipulating windows firewall etc.

The lab is beginner friendly and comes with a lab manual and 6+ hours of video content containing course and walk-through!

What will you Learn?

Attacking Active Directory with Linux (LinuxAD)

The LinuxAD lab enables you to:

  • Understand and practice the basics of attacking Active Directory using metasploit and other tools.

  • Understand how to approach attacking Windows Server 2019 machines.

  • Practice popular tools to understand the techniques they implement.

  • Learn to execute memory-only attacks from Linux against Windows machines.

The following are the prerequisites for the lab:

  • Basic familiarity with Linux command line

  • Basic understanding of information security concepts

bottom of page