AD-Attacks

Lateral Movement in Active Directory

Lateral Movement Techniques Cover

Comprehensive guide to Lateral Movement techniques in Active Directory environments, including various methods attackers use to move between systems and escalate privileges.

Lateral Movement Techniques

Pass-the-Hash
Pass-the-Hash illustration
Use captured NTLM hashes to authenticate to other systems without knowing the plaintext password.
Mimikatz
CrackMapExec
Impacket's psexec.py
Pass-the-Ticket
Pass-the-Ticket illustration
Leverage stolen Kerberos tickets to move laterally and access resources across the domain.
Rubeus
Mimikatz
Kekeo
Overpass-the-Hash
Overpass-the-Hash illustration
Convert NTLM hashes to Kerberos tickets for more stealthy lateral movement.
Rubeus
Mimikatz
Impacket's getTGT.py
Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP) illustration
Use compromised credentials or exploits to gain GUI access to remote systems.
xfreerdp
rdesktop
Metasploit's RDP modules
Windows Admin Shares
Windows Admin Shares illustration
Exploit administrative shares (C$, ADMIN$) for file transfer and remote command execution.
PsExec
smbclient
CrackMapExec
WMI and WinRM
WMI and WinRM illustration
Use Windows Management Instrumentation (WMI) and Windows Remote Management (WinRM) for remote execution.
Impacket's wmiexec.py
Evil-WinRM
PowerShell Remoting
DCOM
DCOM illustration
Leverage Distributed Component Object Model (DCOM) for remote code execution and lateral movement.
Impacket's dcomexec.py
PowerShell DCOM scripts
Service Creation
Service Creation illustration
Create and manipulate Windows services on remote systems for code execution and persistence.
PsExec
sc.exe
Impacket's services.py
Scheduled Tasks
Scheduled Tasks illustration
Create or modify scheduled tasks on remote systems for execution and persistence.
schtasks.exe
PowerShell's ScheduledTasks module
AtNow
GPO Abuse
GPO Abuse illustration
Exploit Group Policy Objects to execute code on multiple systems simultaneously.
SharpGPOAbuse
PowerView
Group Policy Management Console
Token Impersonation
Token Impersonation illustration
Steal and use access tokens to impersonate other users or processes.
Incognito
Mimikatz
TokenManipulation.ps1
Kerberos Delegation Abuse
Kerberos Delegation Abuse illustration
Exploit misconfigured Kerberos delegation to impersonate users and access resources.
Rubeus
PowerView
ADFind

Related Articles

Learn about Pass-the-Hash attacks, a critical lateral movement technique in Active Directory environments. Understand how attackers exploit NTLM hashes, detection methods, and effective mitigation strategies.

RFS

Dive into Kerberos delegation attacks in Active Directory, including unconstrained, constrained, and resource-based constrained delegation. Learn about attack vectors, detection methods, and mitigation strategies.

RFS

Explore NTLM Relay attacks, a powerful technique for lateral movement and privilege escalation in Active Directory environments. Learn about attack methods, detection techniques, and effective mitigation strategies.

RFS

Defending Against Lateral Movement

While understanding lateral movement techniques is crucial for security assessments, it's equally important to implement strong defensive measures. Here are some key strategies to protect your Active Directory environment against lateral movement attempts:

  • Implement the principle of least privilege for user and service accounts
  • Use strong, unique passwords and implement multi-factor authentication
  • Regularly patch and update systems to address known vulnerabilities
  • Implement and maintain endpoint detection and response (EDR) solutions
  • Use Microsoft's Local Administrator Password Solution (LAPS) to manage local admin passwords
  • Implement network segmentation and restrict lateral movement between segments
  • Monitor for suspicious activities and implement robust logging and alerting mechanisms
  • Conduct regular security awareness training for all users
  • Implement Just-In-Time (JIT) and Just-Enough-Administration (JEA) practices
  • Use Privileged Access Workstations (PAWs) for administrative tasks
  • Implement and enforce application whitelisting to prevent execution of unauthorized tools
  • Regularly audit and review Active Directory permissions and configurations
  • Implement time-based one-time passwords (TOTP) for service accounts where possible
  • Use Protected Users security group for privileged accounts to prevent credential caching
  • Implement Windows Defender Credential Guard to protect against credential theft
  • Disable or restrict unnecessary protocols and services (e.g., LLMNR, NetBIOS)
  • Implement and maintain an incident response plan for lateral movement scenarios
  • Use Microsoft Advanced Threat Analytics (ATA) or Azure Advanced Threat Protection (ATP) for advanced threat detection
  • Implement honeypots and honeytoken accounts to detect lateral movement attempts
  • Regularly conduct penetration testing and red team exercises to identify vulnerabilities in lateral movement defenses

For more detailed information on defending against these techniques and implementing a robust Active Directory security strategy, visit our Defensive Techniques page.