Skip to main content

Active Directory Security Audit

Context

Offensive security audit of a clinic's Windows domain and Active Directory: penetration testing, vulnerability identification and remediation plan.

Objectives

  • Perform a complete AD security audit
  • Identify exploitable vulnerabilities
  • Demonstrate risks through proof of concepts
  • Propose a corrective action plan aligned with ANSSI/NIST

Methodology

  1. Reconnaissance: domain enumeration
  2. Exploitation: controlled penetration tests
  3. Post-exploitation: privilege escalation
  4. Report: vulnerabilities and remediations

Tools Used

ToolUsage
nmapNetwork and service scanning
enum4linuxSMB/AD enumeration
KerberoastingKerberos ticket extraction
MimikatzCredential extraction
BloodHoundAD attack path analysis

Identified Vulnerabilities (Examples)

VulnerabilityCriticalityRisk
Accounts with SPN and weak passwordCriticalKerberoasting -> privileged access
NTLM enabledHighPass-the-Hash
Unconstrained delegationHighIdentity impersonation
Cleartext passwords (GPP)CriticalImmediate compromise

Deliverables

Pentest Report (PDF)

Detailed document of penetration tests performed and identified vulnerabilities.

Corrective Action Plan (PDF)

Remediation plan with action prioritization according to criticality level.

Presentation (PDF)

Presentation slides for stakeholder reporting.

Skills Acquired

  • Security audit methodology
  • Pentesting tools usage
  • Active Directory vulnerability analysis
  • Audit report writing
  • Remediation plan development
  • Results presentation to stakeholders