Skip to content

syedhnaqvi/ActiveDirecotryDetectionLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

Active Directory Detection Lab

Objective

The purpose of generate telemetry data and see detctions in action .

Skills Learned

  • Kali Commands as Pen testing .
  • Generating Telemtry data for detections ( Bruteforcing attack)
  • View Telemetry in splunk
  • Atomic Red Team Installtion and setup - Run Atomic Tests

Tools Used

  • Splunk
  • Kali
  • Crowbar for bruteforcing attacks
  • ART

Ref Diagram

image

References

Video Tutorial

STEP -1

Setup & assign static IP to kali 192.168.10.250 as per diagram image

Step -2

Check Connectivity using ping commands : ping google.com and ping 192.168.10.1o ( Our Splunk Sevrer) if you get reply all good !

Step -3

Update and Upgrade Kali Repo's using commands sudo apt-get update && sudo pat-get upgrade -y

Step -4

Create New Directory using command mkdir ad-project in Desktop Folder

Step -5

Install tool crowbar on Desktop command using sudo apt-get install -y crowbar This package contains Crowbar (formally known as Levye). It is a brute forcing tool that can be used during penetration tests Read More image

Step -6

Using rockyou wordlist location /usr/sahre/wordlists image

Unzip file using gunzip command : sudo gunzip rockyou.txt.gz image

Copy file rockyou.txt to /Desktop/ad-project direcotry cp rockyoiu.txt ~/Desktop/ad-project image

Use only first 20 lines instead of using whole file that is huge in size use command head -n 20 > password.txt ( output to txt file) image

image

Add a more password to file using sudo nano passwords.txt image Save CTRL+X Then Y Press Enter.

Step -7

Enable RDP in Win10 Target Machine Search PC then click on Properties image

image

image

image

image

User Click ADD image

Add user jenny smith and terry smith we created earlier . After typing user click check names image

Step -8

Use Crowbar for bruteforcing attack image image

Step -9

Check in SPlunk What telemtry generated from the above bruteforcing activity. Check for index=endpoint tsmith user we used for attack then event id 4625 failed sttempts . image

Note : Check event timing happening rapidly clear indication of brute force attempts then check event id 4624 successful login will show 1 event. image

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published