Introduction¶
Active Directory (AD) is a Microsoft service for Windows domain networks.It provides essential services for managing network resources, user accounts, authentication, and application-specific data.
Core components include:
- AD DS (Domain Services)
- AD LDS (Lightweight Directory Services)
- AD CS (Certificate Services)
- AD FS (Federation Services)
- AD RMS (Rights Management Services)
Active Directory Structure¶
- Domains – Collections of objects (users, groups, devices) sharing a common database
- Trees – Groups of domains connected in a hierarchical structure
- Forests – The top layer, composed of multiple trees interconnected by trust relationships
Key Concepts in Active Directory¶
- Directory – Stores all information about AD objects
- Object – Represents entities such as users, groups, or shared folders
- Domain – A container for directory objects; multiple domains can coexist within a forest
- Tree – A grouping of domains that share a common root domain
- Forest – The highest level in AD, made up of multiple trees with trust relationships
Services Provided by Active Directory Domain Services¶
- Domain Services – Centralized data storage, authentication, and search functionalities
- Certificate Services – Creation, distribution, and management of digital certificates
- Lightweight Directory Services – Directory-enabled application support via LDAP
- Federation Services – Single sign-on (SSO) across multiple web applications
- Rights Management – Protects copyrighted content by restricting unauthorized distribution
- DNS Service – Critical for resolving domain names
Common Active Directory Vulnerabilities¶
- Weak Password Policies – Simple, guessable passwords lacking complexity or length
- Unpatched Software and Systems – Outdated systems exploited via known vulnerabilities
- Excessive Privileges – Over-privileged accounts increase risk if compromised
- Inadequate Monitoring and Logging – Fails to detect suspicious activities or breaches
- Lack of Network Segmentation – Allows attackers to move laterally with ease
- Phishing & Social Engineering – Tricks users into disclosing credentials or installing malware
- Misconfigured Service Accounts – Often over-privileged and high-value targets
- Insecure LDAP Bindings – Unencrypted LDAP traffic can expose credentials to interception