This is a work-in-progress
Below is a checklist to go through when conducting a pentest. Order is irrelevant and many tests require authenticated or admin access. This checklist answers "what to audit on AD?" rather than "how to pwn AD?". A mindmap is in the works for that matter 😉 .
NTLM configuration
Kerberos configuration
Patch management
Access Management (IAM/PAM)
Local administrators have a unique, random, complex and rotating password on every server/workstation (e.g. use of LAPS). This can be checked by dumping a local admin password or hash and attempting credential stuffing (i.e. trying to log in on other resources with that password/hash).
Strong password and lockout policies exist and are applied (complexity enabled, at least 12 chars, 16 for admins, must change every 6 months) and users know not to use simple and guessable passwords (e.g. password == username) limiting credential bruteforcing , guessing , stuffing and cracking attacks.
Tier Model is applied (administrative personnel have multiple accounts, one for each tier, with different passwords and security requirements for each one) and a "least requirement" policy is followed (i.e. service accounts don't have domain admin (or equivalent) privileges, ACEs are carefully set) limiting credential bruteforcing , guessing , stuffing and cracking attacks.
Sensitive network shares are not readable by all users. A "need to know" policy is followed, preventing data leak and other credential-based attacks .
No computer account has admin privileges over another one. This limits NTLM relay attacks.
Credentials Management
Domain-level configuration and best-practices
Networking, protocols and services
Active Directory Certificate Services
Last updated 8 months ago