AD Flashcards
ADMX
IMPORTANT! For disabling web extensions and other cool administrative templates for Group Policy, look further into it!
PAM (Privileged Access Management
Bastion Forest - Is a separate AD forest that is specifically set up for heightened security.
Shadow Security Principals (groups) - special SID that exists in the bastion? tf bitch ass mother fucker cunt?
Expiring Links - you can set links that expire that’s associated with specific Kerberos ticket item?? wtf bitch ass mother fucker what links you even talking about STUPID FUCKER
KDC TTL Enhancement - (Ticket-Granting Ticket Time-To-Live) is like an expiration date for the special “tickets” that computers use to prove their identity in a network.
In the computer world, when you log in and get a special “ticket” from the Key Distribution Center (KDC) through the Kerberos authentication system, that ticket has a TTL. This means it’s only valid for a specific period, like 8 hours. After 8 hours, the ticket expires, and you need to get a new one by re-authenticating.
What is Kerberos?
is the Authentication Protocol
Here’s how Kerberos works:
Authentication: When you try to log into your computer or access a network resource, Kerberos checks your identity. It’s like showing your ID at the club entrance.
Ticket Granting Ticket (TGT): Once your identity is confirmed, Kerberos gives you a special ticket called a Ticket Granting Ticket (TGT). This ticket proves you’re allowed inside the club (network) for a certain period.
Ticket for Access: When you want to access specific resources (like files or databases) within the network, you don’t need to prove your identity each time. Instead, you use your TGT to get a shorter-term ticket for that specific resource. It’s like getting a stamp on your hand so you can move around the club freely without showing your ID at every door.
Encryption: All these tickets and communications between your computer and the network are encrypted, meaning they’re scrambled and secure from prying eyes. This keeps your data safe while it’s traveling across the network.
In Windows Server, Kerberos is kind of like the VIP security system running behind the scenes. You won’t see it as a separate program or window. It’s integrated into the authentication process, making sure that only authorized users and computers can access the resources they’re allowed to, all while keeping everything secure.
learn port #’s
20
File Transfer Protocol (FTP) Data Transfer
21
File Transfer Protocol (FTP) Command Control
22
Secure Shell (SSH)
23
Telnet - Remote login service, unencrypted text messages
25 (same port for scan to email m365)
Simple Mail Transfer Protocol (SMTP) E-mail Routing
53
Domain Name System (DNS) service
80
Hypertext Transfer Protocol (HTTP) used in World Wide Web
110
Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server
119
Network News Transfer Protocol (NNTP)
123
Network Time Protocol (NTP)
143
Internet Message Access Protocol (IMAP) Management of Digital Mail
161
Simple Network Management Protocol (SNMP)
194
Internet Relay Chat (IRC)
443
HTTP Secure (HTTPS) HTTP over TLS/SSL
When installing Roles to AD on a NEW DC what option do you choose?
Add a new forest..
Why? Ur not adding another DC to an existing domain or forest.
Make sure to keep password to AD DS safe for DSRM, what is DSRM?
Directory Services Restore Mode
After creating your new AD DS you’ll be asked to Create a DNS delegation, do you click it or skip it?
Skip it, because were creating the root of a new DNS. It wouldn’t have the ability to be found by any external DNS servers.
What is a NetBIOS domain name?
Nuggetlab dude just put NUGGETLAB
NetBIOS domain names provide a more human-readable way for computers to find and interact with each other.
This is especially useful in the context of Active Directory, where it helps organize and manage resources like user accounts, computers, and other network-related entities.
How do you make a child domain?
Get another DC (just like at work how we have a redudant dc for our main pdc).
Click the flag with the yellow caution sign > Add a new domain to an existing forest > Child Domain > put parent domain name in ph.local > New domain name (ph2) dont put .local?
Make sure to click “Change” and enter in credentials
Make sure DNS is enabled and GC, then put in credentials.
Make sure DNS Delegation is applied as well.
If you have a forest root domain of nuggetlab.com, it will be impossible to install a domain named accusource.net into the same forest because the names are not hierarchical. True or false?
False
AD DS clients locate domain controllers by using: (2 things)
SRV Records (SRV (Service) record is like a signpost in the internet’s address book (DNS). It helps computers find specific services, like email or domain controllers in an Active Directory network.
Imagine you’re looking for the post office in a city. The SRV record is like a sign telling you where to find it. It says things like:
“For email service (_imap) use this server at this address.”
“For domain controller service (_ldap) use this server at this address and port.”
So, when your computer needs to find a specific service, it checks the SRV records in DNS to get the right directions. It’s a way computers navigate the internet efficiently by knowing where to find the services they need.)
&
Active Directory-Integrated DNS Servers
RRAS
Routing and Remote Access Service (not as stable as a VPN but is a VPN???)
What is pivoting in hacking terms?
When a hacker gains access to 1 machine then pivots and gains access to another machine. (PDC to Synology) or (PC to PDC).
DMZ is also knows as?
perimeter network.
A DMZ is like having 2 firewalls and in between is your web server?
Intranet - Firewall Webserver Firewall -Internet
Where is AD data stored?
C:\Windows\System32\NTDS.dit
What makes up the AD Partitions?
- NTDS.dit,
- Configuration (contains info about the forest)
- Schema
- Domain (contains all domain info)
- Application (This is a custom partition that you create and choose which DC’s get a copy of the info).
Global Catalog
Purpose - computers can locate objects within the domains
To install Active Directory how do you install it?
Manage > Next > Next > Active Directory Domain Services
How do you promote a server to a domain controller?
Click the yellow caution flag (to the left of Manage).
What deployment do you choose for your very first PDC?
Add a new forest
What is DSRM?
Domain Services Restore Mode (this is the password you will setup to restore AD from backup). This is during the initial installation when you try to add the server to a domain controller
What is NetBIOS?
is an old ass bitch ass legacy name for older devices that need to be able to interact with.
In production you should disable NetBIOS because its really for devices in the 1999s and older and could be a security risk. Bitch
Where is group policy info stored in the C: Drive?
C\WIndows\SYSVOL
Does putting your AD DS database logs on a seperate drive make your server run faster?
(probably dont need to do this) yes, put your database on one SSD, and put your logs on a different SSD.
When you first setup your redudant DC and need to domain join it to your existing PDC you’ll need to change…
Your DNS to what the primary is if the auto one doesn’t work kinda like what happened at work
Where are virtual machines located in Azure?
Resource Groups
What version OS and hardware is your PDC at work running?
2022 STANDARD.. Not datacenter..
32GB RAM, CPU: Intel Xeon CPU E5-2623 (3ghz, 4 cores, 8 logical processors).
When making a virtual machine in Azure what is a “availability zone?”
Having your virtual machine replicated to other data centers in Azure cloud so that if one data center goes down, you’ve got a replica of your virtual machine in another data center.
Wondering about pricing in Azure or anything microsoft? They have “pricing calculators.”
What is the port # for RDP?
TCP 3389
Don’t allow RDP port from the outside open on the server because hackers could do a port scan (nmap), then ggs. Setup VPN instead
How are RODC passwords stored?
cache, mother fucker
How do you pre-stage a DC to be RODC?
go to users and computers, right click on the Domain Controller container and click pre-create Read only domain controller account..
Once you pre-stage the RODC what is next?
Have someone login to the DC with their credentials and it will activate?
If you need to adjust the password replication policy how do you do this? Also what is this?
Right click on the RODC in the domain controller container in users and computers. Go to Properties, then Password Replication Policy.
Password Replication Policy is which accounts are able to cache for their passwords.
What service needs to be running to remote into the DC via powershell (PS)
WinRM (windows remote management)
What port number does WinRM use?
HTTP: 5985
HTTPS: 5986