Automated AD LAB with BadBlood installed automatically # Part 1

Download the msi or you can use the powershell script to download it.
  1. 1 DC
  2. 1 Machine joined to the AD.
  3. Add your Kali to the same network (optional)
  1. Enables WinRM CredSSP
  2. Enters a wildcard in your system’s TrustedHosts file
  3. Allows credential delegation via local group policy settings
  4. Relaxes a setting for CredSSP patch CVE-2018–0886
Great we have images we can use
  1. 2GB of RAM
  2. DNS setting of 192.168.60.10
  3. Windows Server 2019 Standard Evaluation (Desktop Experience)
  4. Use the name BADBLOOD for the VMS and store it in the directory we specified earlier
  1. Download BadBlood https://github.com/davidprowe/BadBlood
  2. Extract it and put it in your tools folder
  3. Edit Invoke-BadBlood.ps1, remove the lines highlighted in the red box below, add a variable to execute BadBlood and replace line 30–47 with
Collecting data with the bloodhound ingestor

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Teaching Yourself to Code

Why You Should Choose Linux

Rookie Answers Web Questions

Introducing PyFiguration

An Agile Coach’s Smart Guide to Automating Jira

Experiences on Git/GitHub Workshop

Code With Me: Animated Kawaii Cup of Tea

Screenshot of animated steaming mug with cute face on pink background

Product Requirements Document 101

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aaladha

Aaladha

More from Medium

LetsDefend — Suspicious Mshta Behavior [Write-up]

SOC Alert “Suspicious Mshta Behavior” from LetsDefend.io

Building an Active Directory lab

Writeup on TryHackMe (THM) Linux Privilege Escalation Capstone Challenge

1CAT CTF Writups (Մաս #1) — — Granny, MorisoCodvoram, Quack