Welcome to the NetExec Active Directory Lab! This lab is designed to teach you how to exploit Active Directory (AD) environments using the powerful tool NetExec.
Originally featured in the LeHack2024 Workshop, this lab is now available for free to everyone! In this lab, you’ll explore how to use the powerful tool NetExec to efficiently compromise an Active Directory domain during an internal pentest.
The ultimate goal? Become Domain Administrator by following various attack paths, using nothing but NetExec! and Maybe BloodHound (Why not :P)
Obviously do not cheat by looking at the passwords and flags in the recipe files, the lab must start without user to full compromise
Note: One change has been made on this lab regarding the workshop, the part using msol module on nxc is replaced with a dump of lsass. The rest is identical.
The Gallic camp was attacked by the Romans and it seems that a traitor made this attack possible! Two domains must be compromised to find it 🔥
- https://www.rayanle.cat/lehack-2024-netexec-workshop-writeup/ by @rayanlecat
- https://blog.lasne.pro/posts/netexec-workshop-lehack2024/ by @0xFalafel
Submit a PR to add your writeup to this list :)
No automatic install is provided as it depend of your package manager and distribution. Here are some install command lines are given for ubuntu.
-
Installation depend of the provider you use, please follow the appropriate guide :
-
Installation is in three parts :
- Templating : this will create the template to use (needed only for proxmox)
- Providing : this will instantiate the virtual machines depending on your provider
- Provisioning : it is always made with ansible, it will install all the stuff to create the lab
- Aleem Ladha @LadhaAleem for creating this project and converting the LEHACK-2024 workshop to an ansible playbook
- M4yFly @M4yFly for the amazing GOAD porject and ansible playbooks (This repo is based on the work of Mayfly277)
- mpgn @mpgn_x64 for the LeHack workshop
- NetExec's dev team for this awesome tool !
