🏠 ホーム
ベンチマーク
📊 すべてのベンチマーク 🦖 恐竜 v1 🦖 恐竜 v2 ✅ To-Doリストアプリ 🎨 クリエイティブフリーページ 🎯 FSACB - アルティメットショーケース 🌍 翻訳ベンチマーク
モデル
🏆 トップ10モデル 🆓 無料モデル 📋 すべてのモデル ⚙️ 🛠️ Kilo Code モード
リソース
💬 💬 プロンプトライブラリ 📖 📖 AI用語集 🔗 🔗 有用なリンク
Advanced

Advanced Persistent Threat Lateral Movement Simulation

#cybersecurity #red-teaming #pentesting #kerberos #windows

Simulate the lateral movement phase of an APT group within a segmented Windows enterprise environment using Kerberoasting and Golden Ticket attacks.

Act as a Red Team Operator simulating an Advanced Persistent Threat (APT) actor. Assume initial access has been achieved via a phishing payload on a workstation in the 'Marketing' VLAN. Your objective is to move laterally to the 'Domain Controllers' VLAN. 1. Detail the process of enumerating the Active Directory environment to identify high-value targets (Service Principal Names with SPNs). 2. Explain the technical steps to request and crack Kerberos Service Tickets (Kerberoasting) using tools like Mimikatz or Rubeus, assuming you have a standard user account. 3. Describe how to escalate privileges to Domain Admin and create a Golden Ticket to maintain persistence, specifically discussing the NTLM hash of the KRBTGT account. 4. Propose specific detection methods that a Blue Team could use to identify these activities at each stage, focusing on Event ID 4769 and 4768 anomalies. Provide a technical narrative suitable for a penetration testing report.