Vulnerable Active Directory Lab
🛠️ Overview
This lab is a practical, enterprise-grade simulation of a misconfigured Windows domain environment. The lab is designed to mirror real-world Active Directory environments commonly found in corporate networks, complete with intentional misconfigurations that enable initial access, privilege escalation, lateral movement, and full domain compromise.

🔗 Github Repository
View the full project on Github
🔍 Key Objectives
- Simulate a production-like Windows domain environment
- Practice realistic Active Directory attack chains
- Demonstrate enumeration, privilege escalation, and persistence techniques
- Serve as a practical red/blue team portfolio piece
🔐 Lab Highlights
- Automated misconfigurations for Windows Server 2016 and Windows 10 clients
- Privilege Escalation Paths: Reset Password, DCSync
- Walktrough OSCP Style + Template using Sysreptor
- Graph-based path discovery using BloodHound
🔄 Attack Flow Summary
Initial Access → SMB Enumeration → Privilege Escalation → Domain Admin → Persistence
🧰 Tools & Technologies
- VM Management: VMware / VirtualBox
- AD Services: Active Directory DS
- Tools: BloodHound
- Enumeration & Exploitation: SMB, LDAP, RDP, Kerberos, GPP
- OS Platforms: Windows10, Windows Server 2016, Kali Linux
⚠️ Disclaimer
This lab was created for educational and red teaming purposes only. All actions were performed in isolated lab environments under controlled conditions.