Certified Red Team Professional (CRTP) - Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝Certified Red Team Professional (CRTP) - Notes
    • ℹ️0 - Course Summary
      • 1.1
      • 1.2
    • 1️⃣1 - Active Directory (AD)
      • 1.1 - Introduction to Active Directory (AD)
      • 1.2 - Physical Components of AD
      • 1.3 - Logical Components of AD
    • 2️⃣2 - PowerShell
      • 2.1 - Introduction to PowerShell
      • 2.2 - Security and Detection
    • 3️⃣3 - AD Enumeration
      • 3.1 - Host & User Identification
      • 3.2 - Common Services Enum
        • 3.2.1 - LDAP & DNS Enum
        • 3.2.2 - SMB Enum & Common Attacks
      • 3.3 - Domain Enumeration
        • 3.3.1 - PowerView
          • 3.3.1.1 - Domain Enumeration (Video Lab)
        • 3.3.2 - BloodHound
    • 4️⃣4 - Trust and Privileges Mapping
      • 4.1 - Access Control (ACL/ACE)
      • 4.2 - Group Policy
      • 4.3 - Trusts
    • 5️⃣5 - Local Privilege Escalation
      • 5.1 - Privilege Escalation
        • 5.1.1 - Feature Abuse
        • 5.1.2 - Relaying
        • 5.1.3 - GPO Abuse
        • 5.1.4 - Unquoted Service Path
      • 5.2 - Tools
    • 6️⃣6 - Lateral Movement
      • 6.1 - PowerShell Remoting & Tradecraft
      • 6.2 - Crentials Extraction & Mimikatz
    • 9️⃣7 - Kerberos Attack and Defense (Golden, Silver tickets and more)
      • 7.1 - Kerberos Intro
      • 7.2 - AS-REP Roasting
      • 7.3 - Kerberoasting
      • 7.4 - User Enum in Kerberos
    • 6️⃣8 - Persistence
      • 8.1 - Golden Ticket
      • 8.2 - Silver Ticket
      • 8.3 - Diamond Ticket
    • Lab
      • 0 - Lab Instructions
      • 1 - Learning Object 1️
      • 2 - Learning Object 2️
      • 3 - Learning Object 3️
      • 4 - Learning Object 4️
      • 5 - Learning Object 5️
      • 6 - Learning Object 6️
      • 7 - Learning Object 7️
    • 📄Report
      • How to write a PT Report
  • 🛣️RoadMap / Exam Preparation
  • 📔CRTP Cheat Sheet
Powered by GitBook
On this page
  • AD DS Schema
  • Key Features
  • Domains
  • Key Features:
  • Trees
  • Key Features
  • Forests
  • Key Features
  • Organizational Units (OUs)
  • Key Features
  • Trusts
  • Types
  • Objects
  • Key Features
  • Forests and Domain Trusts
  • Difference between OUs and Security Groups
  1. Certified Red Team Professional (CRTP) - Notes
  2. 1 - Active Directory (AD)

1.3 - Logical Components of AD

Previous1.2 - Physical Components of ADNext2 - PowerShell

Last updated 5 months ago

AD DS Schema

The schema defines the structure and rules for objects stored in Active Directory. It is critical for maintaining consistency and ensuring the directory can adapt to organizational needs.

Key Features

  • Object Classes: Define entities like users, computers, and groups. For example, a "User" object class includes attributes such as Username, Email, and Group Membership.

  • Attributes: Specify properties of objects. Each object class has mandatory and optional attributes.

  • Extensibility: Administrators can extend the schema to include custom attributes or object classes as business requirements evolve.

  • Replication: Schema updates are replicated across all domain controllers in the forest to ensure uniformity.

  • Practical Example: When deploying a custom application, you might extend the schema to include new attributes (e.g., "Application License Key") tied to user accounts.

Domains

Domains are foundational units in AD, providing a centralized boundary for management, security, and replication.

Key Features:

  • Organizational Boundary: Each domain groups objects under a shared namespace (e.g., example.com).

  • Security Boundary: Domains enforce access control and authentication policies, ensuring users only access permitted resources.

  • Trust Relationships: Enable collaboration across domains while maintaining distinct security boundaries.

  • Namespace Management: DNS integration allows resources to be easily discovered and accessed.

Real-World Usage: A multinational organization might have separate domains for each region (e.g., europe.example.com, asia.example.com), each with its administrative team and policies.

Trees

A tree is a hierarchical structure comprising a parent domain and its child domains, sharing a contiguous namespace.

Key Features

  • Domains within a tree automatically trust each other through transitive trust relationships.

  • Useful for managing organizations with multiple departments or geographic locations while maintaining a unified structure.

Forests

Forests represent the top-level logical boundary in Active Directory. A forest can contain multiple trees, each with distinct namespaces, but sharing the same schema and Global Catalog.

Key Features

  • Acts as the ultimate security boundary; inter-forest communication requires explicit trust configurations.

  • Forest-wide policies apply uniformly across all domains.

Organizational Units (OUs)

OUs are containers within domains used to organize objects logically for administrative purposes.

Key Features

  • Allow delegation of administrative responsibilities without granting full domain-level access.

  • Enable application of specific Group Policy Objects (GPOs) to subsets of users or computers.

Example: A company might create separate OUs for "Finance," "HR," and "IT," each with tailored policies and administrative controls.

Trusts

Trusts allow users in one domain or forest to access resources in another securely.

Types

  • Transitive Trusts: Automatically established within a forest.

  • External Trusts: Configured between forests or standalone domains.

Practical Use: Trusts are essential for mergers or partnerships where resource sharing is needed while retaining separate administrative boundaries.

Objects

Objects are the individual elements within AD, representing entities like users, groups, computers, and printers.

Key Features

  • Each object belongs to a specific class and is identified by a unique name (e.g., a user's samAccountName).

  • Attributes define the characteristics and functionality of objects.

Forests and Domain Trusts

Trust configurations extend collaboration and resource sharing across forests.

Complexity and Security: Managing trust relationships requires careful planning to avoid unintended access or security gaps.

Difference between OUs and Security Groups

OUs (Organizational Units) are used to organize and manage objects (like users and computers) within a domain. They help with delegating administrative tasks and applying group policies but don’t control access to resources.

Security Groups are used to manage access to resources, such as files or applications. Users are grouped based on the permissions they need, and access is granted based on group membership.

Example: You could have an OU called "HR" to manage HR users, while a "Finance" Security Group might control access to sensitive financial files. OUs organize, while Security Groups manage permissions.

📝
1️⃣
https://info.varonis.com/hubfs/Imported_Blog_Media/domain-forest@2x.png?hsLang=en
https://www.conceptdraw.com/examples/active-directory-policy-structure
https://learn.microsoft.com/it-it/entra/identity/domain-services/media/concepts-forest-trust/forest-trusts-diagram.png
https://learn.microsoft.com/it-it/entra/identity/domain-services/media/concepts-forest-trust/kerberos-over-forest-trust-process-diagram.png