• Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

Exploiting with BloodHound and Mimikatz

In this lab, you’ll practice exploiting Active Directory (AD) using BloodHound and Mimikatz. When you’re finished, you’ll have the skills to identify AD vulnerabilities, gather data with BloodHound, and understand Pass-The-Hash attack using Mimikatz.

Google Cloud Platform icon
Labs

Path Info

Rating
(40 reviews)
Level
Clock icon Beginner
Duration
Clock icon 1h 0m
Published
Clock icon Sep 12, 2024

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Configuring BloodHound and Collecting AD Data

    As part of your role as a penetration tester at Globomantics, you need to analyze the Active Directory environment to uncover potential security weaknesses. BloodHound has already been set up by a fellow team member, so your first task is to access and configure it. Afterward, you'll install and run SharpHound on the Active Directory Domain Controller to collect detailed information about the AD environment. This information will help you map out relationships, permissions, and potential attack paths within Globomantics' AD infrastructure using BloodHound.

  3. Challenge

    Analyzing AD Data in BloodHound

    With the data collected using SharpHound, you will now analyze the Active Directory environment using BloodHound. The information you've gathered includes user relationships, group memberships, and privilege levels. Your goal is to identify critical attack paths that could allow an attacker to move laterally within the network or escalate privileges. This analysis will help you pinpoint the most vulnerable aspects of Globomantics AD infrastructure, providing insights into how an attacker might exploit these weaknesses.

  4. Challenge

    Exploiting AD with Mimikatz

    After identifying potential security gaps in the Globomantics Active Directory environment using BloodHound. As a penetration tester, you'll use Mimikatz on the compromised Windows client to extract NTLM hashes, which will allow you to authenticate as another system without needing their password. Specifically, you will execute a pass-the-hash attack to gain unauthorized access to the Domain Controller, demonstrating how an attacker could escalate privileges and move laterally within the network.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

Sahil Gupta is highly skilled in Product Security, specializing in DevSecOps and Application Security. They are passionate about enhancing security posture & delivering robust and secure solutions.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.