Skip to main content
Support
Interactive Learning Environment

Source
Sudo

Master AD security from zero to advanced. Explore authentication protocols, attack techniques, and defense strategies through interactive, industry-sourced content.

What is an AD Forest?

Build the hierarchy layer by layer

Step 1 of 7

The Forest

An Active Directory Forest is the top-level container. It defines a single security boundary — all domains within a forest share a common schema, configuration, and Global Catalog.

Real-World Analogy

Think of a forest as a country — the ultimate boundary. Everything inside shares the same constitution (schema). You need a passport (explicit trust) to enter another country.

Security Insight

The forest, NOT the domain, is the true security boundary. Compromise one domain in a forest, and the entire forest may be at risk.

corp.local ForestShared Schema
1 / 7
ad-topology.svg
corp.local Forestcorp.localRoot Domain • HQ-Sitechild.corp.localChild Domain • Branch-SiteIT Dept OUHR Dept OUDev Team OUTWO-WAYTRUSTReplicationCross-Site Repl.
DC-01GCPDCeSMDNM
DC-02GCRIDInfra
DC-03GCPDCeRIDInfra
jsmith
admin
SRV-01
SRV-02
mjones
klee
WS-01
WS-02
dev01
devadmin
WS-03
DEV-SRV
Domain Admins
IT Support
Default Policy
Security GPO
Dev Team
Domain ControllerUserComputerGroupGPOTwo-Way TrustReplication

FSMO Roles: Deep Dive

What each role does, why it exists, and what happens when it fails

1 / 7

The 5 Officials Who Keep AD Running

Active Directory uses 5 special roles called Flexible Single Master Operations (FSMO). Unlike normal AD replication where any DC can process changes, these 5 operations require a single authoritative DC to prevent conflicts.

How It Works

2 roles operate at the forest level (one holder per entire forest) and 3 at the domain level (one holder per domain). In a forest with 3 domains, there would be 2 + (3 × 3) = 11 total FSMO role holders. In a single-domain forest, all 5 typically reside on one DC.

City Government Analogy

A country needs certain single authorities — one constitution writer, one registrar, one police chief per city — to prevent chaos from conflicting decisions.

What If It Fails?
Varies by role

Impact varies dramatically by role. Some can be offline for months without notice. One (PDC Emulator) causes immediate problems.

Security Insight

FSMO role holders are high-value targets. Compromising the Schema Master means compromising the entire forest. Always audit who holds these roles and restrict access to the role-holding DCs.

corp.local Forestcorp.localchild.corp.localDCDC-01DCDC-02DCDC-03FOREST-WIDE (1 per forest)Schema MasterDomain Naming MasterPER-DOMAIN (1 per domain)PDC EmulatorRID MasterInfrastructure5 ROLES TOTAL
1 / 7

FSMO Roles: The City Government Challenge

5 roles that keep Active Directory running — can you match each incident?

Forest-wide (1 per forest)Per-domain (1 per domain)

Kerberos Authentication Flow

Step-by-step through the ticket-based authentication protocol

Step 1 of 8

The Players

Meet the 3 entities in Kerberos authentication

Kerberos authentication involves three parties: the Client (a user or service requesting access), the Key Distribution Center (KDC) which runs two services — the Authentication Service (AS) and the Ticket Granting Service (TGS) — and the Application Server (the resource the client wants to access).

How It Works

The KDC runs on every Domain Controller and holds the keys (password hashes) for every principal in the domain. It acts as a trusted third party — neither the client nor the server ever send passwords directly to each other. Instead, they rely on encrypted tickets issued by the KDC to prove identity.

Real-World Analogy

Think of an amusement park. The Client is a visitor. The KDC is the main ticket booth (AS verifies your ID, TGS issues ride tickets). The Application Server is a specific ride. You never show your ID directly to the ride operator — you show the ticket the booth gave you.

Kerberos Authentication FlowKey Distribution Center (KDC)CClientUser / WorkstationASASAuth ServiceTGTGSTicket GrantingSApp ServerTarget ServiceClient authenticates via KDC, never sends password to the serviceRequest (REQ)Response (REP)
1 / 8

Kerberos Delegation Explained

Unconstrained, constrained, protocol transition & RBCD

Step 1 of 6

What Is Delegation?

Kerberos delegation allows a server to access resources on behalf of a user. For example, when a user authenticates to a web application, that web server may need to query a SQL database as the user to enforce proper access control. Without delegation, the server would need its own credentials or a shared service account, losing user-level auditing.

Real-World Analogy

A receptionist (front-end server) needs to unlock your personal mailbox (back-end resource) using your authority. You give the receptionist permission to act on your behalf so they can retrieve your mail without you walking to the mailroom yourself.

Security Insight

Delegation is powerful but dangerous -- it allows servers to impersonate users to other services. If misconfigured, a single compromised server can become a pivot point for lateral movement across the entire domain.

Delegation ConceptUUser[email protected]WWeb ServerFront-End ServiceDBSQL ServerBack-End ResourceAuthenticates?How does the serveraccess DB as user?Delegation = Server acts on behalf of userThe server needs permission to impersonate the user to back-end services
1 / 6

AD CS: Certificate Attack Surface

How certificate misconfigurations lead to domain compromise

Step 1 of 7

What Is AD CS?

The Microsoft PKI built into Windows Server

Active Directory Certificate Services (AD CS) is the Microsoft PKI (Public Key Infrastructure) built into Windows Server. It issues digital certificates for authentication, encryption, and code signing. Certificates can be used to authenticate to AD just like passwords via PKINIT.

Real-World Analogy

AD CS is like the government office that issues passports. If someone can forge a passport, they can become anyone. A Certificate Authority (CA) signs certificates that prove identity. Certificate Templates define what types of certificates can be requested and by whom. AD CS was largely ignored by attackers until 2021 when SpecterOps published "Certified Pre-Owned," revealing a massive attack surface hiding in plain sight.

Security Insight

AD CS was largely ignored by attackers until 2021 when SpecterOps published "Certified Pre-Owned." Since then, misconfigured certificate templates have become one of the fastest paths to domain compromise.

CACA ServerCertificate AuthorityTTemplatesCertificate TemplatesCClientUser / Computerdefines policiesCERTX.509PKINIT Auth"Certified Pre-Owned" -- SpecterOps 2021
1 / 7

AD Persistence Techniques

10 ways attackers maintain access after initial compromise

Forest / SchemaDomain ControllersGroup PolicyUsers & GroupsCertificate ServicesWorkstationsSchemaConfigDCDC-01DCDC-02KRBKRBTGTDefault GPOSecurity GPOScriptsAdminSDHolderDA GroupUser01User02SvcAcctRoot CASub CATemplatesWS-01WS-02SRV-APP12345678910
Forest / Schema
Domain Controllers
Group Policy
Users & Groups
Certificate Services
Workstations

Click a Persistence Point

Select any numbered hotspot on the infrastructure map to learn how attackers maintain persistent access to AD environments.

10 persistence techniques mapped

Tiered Administration Model

Why credential isolation is the foundation of AD security

Step 1 of 5

The Tier Model

Microsoft's tiered administration model segments the AD environment into three trust zones. Each tier has dedicated admin accounts, workstations, and credentials — never shared across tiers.

Tier Legend
Tier 0 -- Domain Controllers, AD, PKI
Tier 1 -- Servers, Applications
Tier 2 -- Workstations, Users
Security Insight

Without tiered isolation, a single compromised workstation can escalate to full domain compromise through credential reuse and lateral movement.

Tier 0Control PlaneTier 1Management PlaneTier 2Access PlaneDomain Controllers, AD, PKIServers, ApplicationsWorkstations, UsersESAE / Enhanced Admin Environment
1 / 5

Security Event Explorer

Which events fire during which attacks?

Showing 12 of 12 events
InfoWarningCritical

DC Hardening Challenge

How secure is your Domain Controller? Check each item you'd implement.

F0%
Critical Risk
0 / 142 points
0 of 16 items checked
10 pts
8 pts
10 pts
8 pts
10 pts
8 pts
8 pts
8 pts
12 pts
8 pts
10 pts
8 pts
10 pts
8 pts
8 pts
8 pts

Each item represents a real-world security control recommended for production Domain Controllers. Higher-point items address more critical attack vectors.

Grade: F
SourceSudo

Content sourced from Microsoft Documentation, MITRE ATT&CK Framework, NIST SP 800-63/171, adsecurity.org (Sean Metcalf), SpecterOps research, and SANS Reading Room. For educational purposes only.