Skip to main content

THM | Active Directory Basics

· 3 min read

Windows Exploitation Basics | Active Directory Basics | Summary:

This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Active Directory Basics room.


Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.

Task | 1 | Introduction

Question 1: Click and continue learning!

No answer needed

Task | 2 | Windows Domains

Question 1: In a Windows domain, credentials are stored in a centralised repository called...

Active Directory

Question 2: The server in charge of running the Active Directory services is called...

Domain Controller

Task | 3 | Active Directory

Question 1: Which group normally administrates all computers and resources in a domain?

Domain Admins

Question 2: What would be the name of the machine account associated with a machine named TOM-PC?

TOM-PC$

Question 3: Suppose our company creates a new department for Quality Assurance. What type of containers should we use to group all Quality Assurance users so that policies can be applied consistently to them?

Organizational Units

Task | 4 | Managing Users in AD

Question 1: What was the flag found on Sophie's desktop?

<flag>

Question 2: The process of granting privileges to a user over some OU or other AD Object is called...

delegation

Task | 5 | Managing Computers in AD

Question 1: After organising the available computers, how many ended up in the Workstations OU?

7

Question 2: Is it recommendable to create separate OUs for Servers and Workstations? (yay/nay)

yay

Task | 6 | Group Policies

Question 1: What is the name of the network share used to distribute GPOs to domain machines?

sysvol

Question 2: Can a GPO be used to apply settings to users and computers? (yay/nay)

yay

Task | 7 | Authentication Methods

Question 1: Will a current version of Windows use NetNTLM as the preferred authentication protocol by default? (yay/nay)

nay

Question 2: When referring to Kerberos, what type of ticket allows us to request further tickets known as TGS?

Ticket Granting Ticket

Question 3: When using NetNTLM, is a user's password transmitted over the network at any point? (yay/nay)

nay

Task | 8 | Trees, Forests and Trusts

Question 1: What is a group of Windows domains that share the same namespace called?

Tree

Question 2: What should be configured between two domains for a user in Domain A to access a resource in Domain B?

A Trust Relationship

Task | 9 | Conclusion

Question 1: Click and continue learning!

No answer needed