Skip to main contentSkip to main content
Room Banner
Back to all networks
Room Icon

AD: Authenticated Enumeration

Premium room

Explore how to breach and enumerate Active Directory with an authenticated account.

medium

60 min

3,148

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Press 'Start' to begin

In the previous room, : Basic Enumeration, we covered various reconnaissance and enumeration activities that don’t require authentication. In this room, our focus will be on activities that are carried out once we have access to an authenticated account.

Learning Objectives

Upon completing this room, you will learn about:

  • AS-REP Roasting
  • Using the net command for enumeration among others
  • Enumeration using the ActiveDirectory PowerShell module
  • Enumeration using PowerSploit’s PowerView module
  • Enumeration with BloodHound

Learning Prerequisites

For maximum benefit, you should have a good understanding of networking concepts and protocols and knowledge of Linux, MS Windows, and Active Directory. You can learn about these topics or refresh your knowledge by going through the following, depending on your goals:

In addition to familiarity with the above topics, we recommend finishing the AD: Basic Enumeration room.

Starting the Network

Before moving to the next task, click the green Start button under the network diagram. Give the network enough time to launch.

You can connect to the network in two ways:

Option 1: Using the AttackBox

Click the Start AttackBox button at the top of this room (make sure you have started the network first). Once ready, your AttackBox will be available in split view. In case it's not showing up, you can click the Show Split View button at the top of the page.

It is worth noting that if you have started the AttackBox in another room before starting the network, you will have to terminate your AttackBox instance and start it again so that it gives you access to this room's network.

Option 2: Over a VPN Connection

Alternatively, you can connect to the network via the VPN. To establish a VPN connection to this network, you need to browse to the access page, click the Networks tab, select Jr-Pentester-AD-v01-BH, and hit the Download configuration file button. Note that if you don’t see this file available for download, please ensure you have started the network in the room and give it a few minutes.

Under the Networks tab, you need to choose Jr-Pentester-AD-v01-BH and click the Download configuration file button.

Then run the following command from the same directory where your VPN configuration file is located:

sudo openvpn [your_configuration_file_name.ovpn]

Note: It is important that you do not use the AttackBox and the connection simultaneously.

Verifying Connectivity to the Network

You can run the route command to verify that your attacker machine can communicate with the target network. The terminal below shows an example output. In particular, note the 10.211.12.0 line.

Terminal
           root@tryhackme:~# route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
default         10.10.0.1       0.0.0.0         UG    100    0        0 ens5
10.10.0.0       0.0.0.0         255.255.0.0     U     100    0        0 ens5
10.10.0.1       0.0.0.0         255.255.255.255 UH    100    0        0 ens5
[...]
10.211.12.0     10.250.12.1     255.255.255.0   UG    1000   0        0 tun0
10.250.12.0     0.0.0.0         255.255.255.0   U     0      0        0 tun0
[...]
        

Alternatively, you can use the ip route command. In particular, note the 10.211.12.0 line.

Terminal
           root@tryhackme:~# ip route
default via 10.10.0.1 dev ens5 proto dhcp src 10.10.130.73 metric 100 
10.10.0.0/16 dev ens5 proto kernel scope link src 10.10.130.73 metric 100 
10.10.0.1 dev ens5 proto dhcp scope link src 10.10.130.73 metric 100 
[...]
10.211.12.0/24 via 10.250.11.1 dev tun0 metric 1000 
10.250.12.0/24 dev tun0 proto kernel scope link src 10.250.12.2 
[...]
        

Confirm that you can see the 10.211.12.0 subnet in the command output. If it is in the output, your machine should be able to communicate with the target network. Moreover, we have enabled the target machines to respond to the ping command, so you can use it to verify connectivity.

Troubleshooting Connectivity Issues

If you cannot connect to the network from your AttackBox, please open the terminal and run the tryconnectme command. This will run a troubleshooting script:

Terminal
           root@tryhackme# tryconnectme                                                  

TryHackMe's network room connection debugger, at your service!

Before we dive deeper, please make sure that you are only using the AttackBox
and do not have your network VPN profile running anywhere!

The AttackBox uses the same VPN profile as you would use on your own machine
and you are only allowed to run the VPN profile once!

If you are running in two places, stop the other VPN and restart the AttackBox please!

If you confirm that you are only using the AttackBox, press [Y], otherwise, the debugger will quit: Y

        

Once you have made sure that you are only connecting to the network from the AttackBox, you can enter the following IP: 10.211.12.10

Terminal
           [...]
In the network room, look at the network diagram and please provide an IP address being shown to you there.
Format should be X.X.X.X: 10.211.12.10

Trying to ping the VPN server at 10.211.12.250...
        

From there, follow the instructions given by the script. When the script asks for your server, enter Jr-Pentester-AD-v01-BH.

If you encounter any issues, please reach out to us on Discord (opens in new tab) or via email at support@tryhackme.com.

Answer the questions below

I am ready to begin exploring authenticated enumeration.

Ready to learn Cyber Security?

The AD: Authenticated Enumeration room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.