SANS Workshop: Shadow Steps: Understanding and Detecting User Impersonation and Lateral Movement in Active Directory
This hands-on, scenario-driven workshop delves into how attackers move stealthily through Active Directory environments using user impersonation and lateral movement techniques. Participants will explore how attackers exploit credentials and trust relationships to expand their access, and how defenders can detect, prevent, and respond to such threats.
Through simulated exercises and guided labs, participants will walk through real-world attack paths such as (over)Pass-the-Hash, Kerberoasting, and token impersonation.
Learning Objectives:
- Understand the key mechanisms behind user impersonation in Active Directory.
- Demonstrate how attackers perform lateral movement via tools and techniques such as:
- Pass-the-Hash
- Pass-the-Ticket/Overpass-the-Hash
- Remote Services Abuse (SMB, WMI, RDP, WinRM)\
- SOCKS PTH
- Kerberoasting
- Token Impersonation
- Token Creation
- This hands-on workshop is ideal for Penetration Testers with limited knowledge about AD internals.
Submit a PR to add your writeup to this list :)
No automatic install is provided as it depend of your package manager and distribution. Here are some install command lines are given for ubuntu.
-
Installation depend of the provider you use, please follow the appropriate guide :
- Install with VmWare [comming soon]
- Install with VirtualBox [comming soon]
- Install with Ludus
- Install with AWS (https://logout.gitbook.io/lateral-movement-in-ad-with-empire)
-
Installation is in three parts :
- Templating : this will create the template to use (needed only for proxmox)
- Providing : this will instantiate the virtual machines depending on your provider
- Provisioning : it is always made with ansible, it will install all the stuff to create the lab
- Jean-François Maes for creating this SANS workshop
- M4yFly @M4yFly for the amazing GOAD porject and ansible playbooks (This repo is based on the work of Mayfly277)
- BC-SECURITY team for their awesome tool Empire and StarKiller
- Bad Sector Labs for testing the code and guidance
- Elastic Security for their awesome SIEM and Stack
