Course Title: Active Directory Security and Attacking Kerberos Training Course
Executive Summary
This intensive two-week course provides a deep dive into Active Directory (AD) security, focusing on Kerberos authentication vulnerabilities and attack techniques. Participants will learn to identify, exploit, and mitigate common AD security flaws through hands-on labs and real-world scenarios. The curriculum covers Kerberos internals, attack vectors like Golden and Silver Ticket attacks, and defense strategies including proper configuration, monitoring, and incident response. The course emphasizes practical skills to secure AD environments against both internal and external threats, including privilege escalation, lateral movement, and data exfiltration. Graduates will be equipped to proactively defend their organizations against advanced AD attacks and enhance their overall security posture.
Introduction
Active Directory (AD) remains the cornerstone of identity and access management for countless organizations worldwide. However, its complexity and ubiquity also make it a prime target for attackers. Kerberos, the primary authentication protocol used by AD, is particularly susceptible to exploitation if not properly configured and monitored. This course is designed to provide security professionals with the knowledge and skills necessary to understand, assess, and defend against Active Directory attacks, with a specific focus on Kerberos-related vulnerabilities. Through a combination of theoretical instruction and hands-on labs, participants will gain practical experience in identifying weaknesses, simulating attacks, and implementing effective security measures. The course emphasizes a proactive approach to AD security, enabling participants to anticipate and mitigate potential threats before they can be exploited. By the end of this program, participants will be able to confidently secure AD environments against a wide range of attack vectors, including advanced persistent threats (APTs).
Course Outcomes
- Understand the fundamentals of Active Directory and Kerberos authentication.
- Identify common Active Directory security vulnerabilities and misconfigurations.
- Execute and defend against Kerberos-based attacks, including Golden and Silver Ticket attacks.
- Implement robust security measures to protect Active Directory environments.
- Monitor Active Directory for suspicious activity and potential security breaches.
- Develop incident response plans for Active Directory security incidents.
- Enhance overall security posture by proactively addressing Active Directory vulnerabilities.
Training Methodologies
- Interactive lectures and discussions.
- Hands-on labs simulating real-world attack scenarios.
- Case study analysis of historical Active Directory breaches.
- Practical exercises in vulnerability assessment and penetration testing.
- Group projects focused on designing and implementing security solutions.
- Live demonstrations of attack techniques and defense strategies.
- Q&A sessions with experienced security professionals.
Benefits to Participants
- Enhanced understanding of Active Directory security principles and best practices.
- Improved ability to identify and mitigate Active Directory vulnerabilities.
- Hands-on experience with attack and defense techniques.
- Increased confidence in securing Active Directory environments.
- Valuable skills that are in high demand in the cybersecurity industry.
- Career advancement opportunities in security roles.
- Certification recognizing expertise in Active Directory security.
Benefits to Sending Organization
- Reduced risk of Active Directory security breaches and data loss.
- Improved compliance with industry regulations and security standards.
- Enhanced security posture and resilience against cyberattacks.
- More effective incident response capabilities.
- Increased employee productivity due to reduced downtime from security incidents.
- Better protection of sensitive data and intellectual property.
- Enhanced reputation and customer trust.
Target Participants
- System Administrators
- Security Engineers
- IT Auditors
- Penetration Testers
- Incident Responders
- Security Architects
- Identity and Access Management Specialists
Week 1: Active Directory and Kerberos Fundamentals
Module 1: Active Directory Architecture and Concepts
- Introduction to Active Directory domains, forests, and trusts.
- Understanding Organizational Units (OUs) and Group Policy Objects (GPOs).
- Active Directory schema and naming conventions.
- Domain Controllers and their roles.
- Active Directory replication and site topology.
- Active Directory security principles.
- Lab: Setting up a basic Active Directory environment.
Module 2: Kerberos Authentication Protocol
- Kerberos concepts: Principals, realms, and Key Distribution Centers (KDCs).
- The Kerberos authentication process: AS_REQ, AS_REP, TGS_REQ, TGS_REP, AP_REQ, AP_REP.
- Kerberos tickets and their components.
- Delegation and constrained delegation.
- Kerberos encryption types and their security implications.
- Kerberos configuration and troubleshooting.
- Lab: Analyzing Kerberos traffic with Wireshark.
Module 3: Active Directory Security Vulnerabilities
- Common Active Directory misconfigurations.
- Weak passwords and password policies.
- Unconstrained delegation and its risks.
- ACL vulnerabilities and privilege escalation.
- Group Policy vulnerabilities.
- Insecure service accounts.
- Lab: Identifying Active Directory vulnerabilities with BloodHound.
Module 4: Attacking Kerberos – Reconnaissance and Initial Access
- Enumerating Active Directory with tools like PowerView and ADFind.
- Discovering privileged accounts and groups.
- Identifying vulnerable systems and services.
- Exploiting weak passwords with password spraying and brute-force attacks.
- Leveraging Kerberos for initial access.
- Setting up persistence in Active Directory.
- Lab: Performing Active Directory reconnaissance with PowerView.
Module 5: Attacking Kerberos – Privilege Escalation
- Exploiting unconstrained delegation for privilege escalation.
- Abusing ACLs to gain elevated privileges.
- Leveraging Group Policy for privilege escalation.
- Exploiting vulnerable service accounts.
- Performing Kerberoasting attacks to crack service account passwords.
- Abusing shadow credentials.
- Lab: Exploiting Kerberos vulnerabilities for privilege escalation.
Week 2: Advanced Attacks, Defenses, and Incident Response
Module 6: Advanced Kerberos Attacks – Golden and Silver Tickets
- Understanding Golden Ticket attacks and their impact.
- Creating Golden Tickets with Mimikatz.
- Defending against Golden Ticket attacks.
- Understanding Silver Ticket attacks and their impact.
- Creating Silver Tickets with Mimikatz.
- Defending against Silver Ticket attacks.
- Lab: Performing Golden and Silver Ticket attacks.
Module 7: Lateral Movement in Active Directory
- Understanding lateral movement techniques.
- Using Pass-the-Hash (PtH) and Pass-the-Ticket (PtT) attacks.
- Leveraging WMI and PowerShell for lateral movement.
- Exploiting trust relationships for cross-domain attacks.
- Using tools like BloodHound to map attack paths.
- Implementing lateral movement detection and prevention strategies.
- Lab: Performing lateral movement with Mimikatz and PowerShell.
Module 8: Defending Active Directory – Hardening and Monitoring
- Implementing strong password policies and account lockout policies.
- Enforcing multi-factor authentication (MFA).
- Hardening Domain Controllers and member servers.
- Implementing Privileged Access Management (PAM).
- Monitoring Active Directory for suspicious activity.
- Using Security Information and Event Management (SIEM) systems for log analysis.
- Lab: Configuring advanced security settings in Active Directory.
Module 9: Detecting and Preventing Kerberos Attacks
- Detecting Golden and Silver Ticket attacks.
- Monitoring Kerberos traffic for anomalies.
- Using honeypots to detect attackers.
- Implementing Kerberos auditing and logging.
- Using Advanced Threat Analytics (ATA) and Azure ATP for threat detection.
- Implementing Least Privilege Administrative Model.
- Lab: Setting up Kerberos auditing and monitoring.
Module 10: Active Directory Incident Response and Recovery
- Developing an Active Directory incident response plan.
- Identifying and containing security breaches.
- Performing forensic analysis of Active Directory attacks.
- Recovering from Active Directory corruption and data loss.
- Restoring Domain Controllers from backups.
- Implementing business continuity and disaster recovery plans.
- Case Study: Analysing real-world Active Directory attacks.
Action Plan for Implementation
- Conduct a comprehensive Active Directory security assessment.
- Prioritize and remediate identified vulnerabilities.
- Implement robust security measures, including strong passwords, MFA, and PAM.
- Configure Active Directory auditing and monitoring.
- Develop an incident response plan for Active Directory security incidents.
- Train employees on Active Directory security best practices.
- Regularly review and update Active Directory security policies and procedures.
Course Features
- Lecture 0
- Quiz 0
- Skill level All levels
- Students 0
- Certificate No
- Assessments Self





