IOT Hacking | Firmware Analysis 101
Hello friends, I will make a new series about IOT Hacking because I want to share my knowledge with y’all, I hope it will be useful and easy to …
Its a directory service used to managed windows network, Store the information on the network and makes it easily available to users and admin.
In short the DC is The Admin of the Active Directory that he has an access of all the network, An explanation for that the role of Domain Controler is to provide authentication and Authorization to different services and users.
An Active Directory contains DataBase that has information about users, services and applications, in NTDS.DIT file and this file locate is “%SystemROOT\NTDS%” folder, Bassed on that it is the most critical file if the AD.
Domain is used to group objects together and manage them and it provides an Authentication and Authorization that provides a way to limit the scop of access to the resourses of that domain.
Goup of Domains with the same root and Domains in this group trust each other ex: CORP.local » x.CORP.local , y.CORP.local.
forest is the highst level of the organization hierarchy and it contains a collection of trees and the trees are connected by trust relationships.
It is a container holds Active Directory objects like users, groups, and computers, it is the smallest unit in AD, the administrator can assign group policy settings or account permissions, and OU cant contain objects from another Domain.
Its way to let more than differant Domain can access resources between other in order to gain permission to this resources, there are two type of trusts.
This trust is easy to understand its just trusting domain to trusted domain.
Its a two-way relationship created between parent and child Domains, when we created Domain it shares resources with parent domain by default, the transitive property of equality states that if a = b and b = c, then a = c. transitive trust relationship, if domain A trusts domain B, and domain B trusts domain C, then domain A trusts domain C.
AD is based on the Lightweight Directory Access Protocol (LDAP). This protocol provides a common language for clients and servers to speak to one another.
Security Identifer is a unique ID that the Domain Controller uses to identify user, group, computer on a DC network.
The Group Policy provides the ability to manage configuration and changes easily in AD.
The GPO
can be abused for various attacks like privesc, backdoors, persistence etc.
Its the ability of control the proccess to access objects and resourses in Active directory based on.
Its a list of access control entries (ACE), ACE corresponds to individual permission or audits access, who has permission and what can be done on an object?
The list of permission that who have the permission to access the object.
logs success and failure audit messages when an object is accessed.
I hope its useful see you in the next part <3 .
Hello friends, I will make a new series about IOT Hacking because I want to share my knowledge with y’all, I hope it will be useful and easy to …
First of all in this blog we will discuss an authentication protocol called Kerberos. what is Kerberos? How does it work? Authentication flow How can …