PentestingLab is a lab environment for Active Directory intended for security assesment and penetration testing practice. This is achieved through automated deployment using AutomatedLab.
Install AutomatedLab by referring to the official documentation.
Download the Microsoft Windows iso image to the LabSources folder.
- Windows Server 2022
- Windows 10
- Windows 11
- SQL Server 2019
After installing PentestingLab, shut down the virtual machines and take snapshots.
PS C:\> Install-PentestingLab.ps1
PS C:\> Stop-LabVM -All
PS C:\> Checkpoint-LabVM -All -SnapshotName InitialSetup
If you are building a lab environment with access to the Internet, you will need to manually build a proxy server using this document as a reference. After building the proxy server, install the lab with the -EnableInternet option enabled.
PS C:\> Install-PentestingLab.ps1 -EnableInternet
After installing the lab, add a network adapter to the proxy server and attach PentestingLab to the virtual switch.
- WIN2022-DC01
- Kerberoast (The Hacker Recipes)
- WIN2022-CA01
- Misconfigured Certificate Templates - ESC1 (The Hacker Recipes)
- NTLM relay to AD CS HTTP endpoints - ESC8 (The Hacker Recipes)
- WIN2022-FS01
- WIN2022-SQL01
- Steal NetNTLM hash from MSSQL (HackTricks)
- WIN10-WS01
- Dumping credentials for high privilege domain account from LSASS (The Hacker Recipes)
- WIN11-WS02