Intro

This lab is going to be the first of many. There is so much to learn and there is so much to experiment with here. It is going to be a great experience. So without further ado let’s start with an overview.

Overview

AD-Lab-overview

The above diagram gives a brief overview of the whole lab. We have a total of 4 VMs set up. I’ll go through more info regarding each one.

  1. Active Directory Server - It is a Windows server 2019 running ADDS services. 2 vCores and 2 Gigabytes of RAM is assigned, sufficient for our requirements. The image for the windows server installation can be acquired from the Microsoft Evaluation Center by providing the required info here. The static IP address for the server is 10.0.0.5.
  2. Windows 10 - As the name suggests a simple installation of Windows 10 Pro. As with the server, 2 vCores and 2 Gigabytes of RAM assigned. You can download it using the official Microsoft tool here. The IP address will be dynamically assigned by the DHCP server.
  3. Splunk Server - It is a Ubuntu 22.04 virtual machine running Splunk server. 2 vCores and 4 Gigabytes of RAM is provided. It is recommended to provide more resources but for the sake of this small lab, this much resources seem to be just enough. We can get the splunk trial from their official website here. The IP address assigned should be static. In my case it already had a static IP so, no configuration needed. In the next part, I’ll show how to assign static IP address to ubuntu if that is not the case for you.
  4. Kali Machine - It needs no explaination, it is the benchmark linux distribution for pentesting, best for our use to generate telemetry for our small lab. I am using WSL(Windows Subsystem for Linux) to run Kali as it takes less resources this way. If you want to implment it in the way I did it, you can refer to their offiical documentation here. The process can be a bit tedious on Windows 10, but it very simple for Windows 11. So I recommend if you don’t want extra hassle and have extra resources to spare, just spin up another Kali VM. The IP address will be DHCP assigned only.

Note - All the VMs are on the same NAT network. It is a default network with VirtualBox and VMware. Make sure that all the VMs are on NAT network to ensure connectivity. If you wish to avoid any contact with internet(not recommended for installation segments) you can proceed with host-only network or custom networks.

There are a few things which are not covered in this blog

  1. Installation of any VM will not be covered whatsoever.
  2. Setup of VMware or VirtualBox will not be covered.
  3. Only the configuration of the Windows Server, Windows 10, Splunk server will be covered.
  4. Attacker Machine i.e. Kali installation will not be covered whatsoever.
  5. The Splunk server installation and configuration will be covered in the next part. Only Active Directory part is covered here.

Let’s begin with the configuration then!

Windows Server Configuration

Assuming that Windows Server is successfully installed, we’ll be greeted by the trusty Server Manager.
server manager

But before we head on with the server configuration we need to rename the server. (And not make the mistake I made. I configured the server, promoted it to Domain controller and then to rename the server I had to demote the server and redo it :))
Doing that is fairly simple. Search “This PC” on search bar and open properties.
server rename

Here we’ll click “Change Settings” and click on rename the server. It’s as easy as it can get.
renamed server

With the server renamed, let’s get started with getting the Active Directory Domain Services installed. For that, we’ll return to the Server Manager and head over to the “Add Roles and Features” section as shown in the screenshot below.
manage_roles

Here we’ll select Role-Based installation.
role_based

Select the desired server. In my case it’s just one available.
select_server

Select the AD DS services, then add features as shown below and defaults should be fine so click next until the installtion page.
ad_ds_install

Once the installation is completed, we can close the dialog and proceed with the promotion of the server to the Domain Controller status.
install_complete

To promote the server click the yellow exclamation mark near the flag and you should be able to see the option to promote the server.
promote

We should be greeted with the Deployment Configuration dialog. Here, we’ll create a new forest.
new_forest

Next, we’ll set up the DSRM (Directory Services Restore Mode) Password.
DSRM_Pass

You shouldn’t need to make any adjustments to the in-between settings so we can directly jump straight to pre-requisite checks.
check_install

Here you can notice that we don’t have a static IP address, which is a must for the server. So up next we’ll proceed to fix that.
Right click the network tab on the bottom right and select the “Network and internet settings”. After that we’ll head over to Network and sharing center. network_settings

In the network and sharing settings, head over to the “Change adapter settings” and then to the properties of the network adapter. Followed by IPv4 properties as shown.
network_properties

As per the diagram shown in the overview section, I’ve set the static IP address and the default gateway. If you’re unaware of your default gateway, make sure to confirm it on powershell using “ipconfig /all” command as shown below.
network_set

Once that is done, we can check connectivity and our updated settings in powershell (Check your default gateway/network settings here before implementing). A simple ping command tells us that it is working.
network_test

Before we move on to the Windows 10 machine. Let’s create a couple of Organisational units and users so that we can login to the Active Directory as normal users. For that we’ll go back to the server manager and to the AD users and computers section.
ad-user-settings

Here, we’ll right click that domain that we’ve created and create a new Organisational Unit.
ad_ou

I’ve created two units, one IT and the other as HR. Right click on each new unit, go to the new section and user afterwards to create a new user.
ad_user_creation

Here, enter all the desired information and on the next page create a password as shown below.
ad_user_create
ad_user_pass

Next we’ll right click the user in IT unit and go to the properties tab. Go to the “Member of” section and add it to the Administrators groups.
ad_user_admin
With this, we’ve got a couple of users to login with.

Windows 10 Configuration

Now let’s head over to our Windows 10 machine. Before we onboard it to our domain, we first have to change the DNS address to the one of our Active Directory Domain Controller because we’re working with a local domain only, we can’t query it to the web. Just like we set up the static IP on the server, we’ll follow the same steps. Network & Sharing center > Change Adapter settings > Adapter Properties > IPv4 configuration.
ad_user_ip
ad_user_ip_set

Next up, just like we renamed our server, we’ll rename the Windows 10 machine as well. We’ll head over to the properties and click on rename this PC option.
ad_rename_pc
ad_renamed_pc

Once renamed, if we scroll down on the same page, we’ll see “Advanced System Settings”. Clicking there we’ll see an option to change the domain on the computer. Here we’ll add our created domain and it will prompt us for user and password. I’ll use one of newly created users for that.
ad_user_login

It will prompt us to login again. When the windows login screen will appear, make sure to select “Other User” in the bottom left and make sure that it says that we’re logging in to a damain as highlighted below.
ad_user_login_ad

Now you should be greeted with the Windows 10 home screen. With the Windows 10 configuration completed next step is to install Sysmon on both, server and the user machine.

Sysmon Installation

I will only cover the installation of sysmon on the server because the steps are inherently same on both server and the windows 10 machine. In the windows server, we’ll head on to the Sysmon’s website here and download the latest version available.
sysmon_install

Now we’ll open an administrator powershell.
Note - On the server it might not ask you for authentication, but when doing the same on windows 10 machine it will ask for admin user and pass. Make sure to supply administrator credentials as shown below. UAC

Before we go ahead with the setup of Sysmon, we’ll require a basic configuration for the same as well. We can get configuration from this. I’ll be using sysmonconfig-with-filedetele.xml.
sysmon_git

In the administrator powershell, I’ll head over to the folder where I extracted sysmon using the “cd” command and then I’ll run the following command.

1
.\Sysmon64.exe -i .\sysmonconfig-with-filedelete.xml

Here “-i” installs the service using our provided config file.
sysmon_with_config

We’ll be greeted by EULA, which after accepting we can see that Sysmon will be installed and running.
Sysmon_eula
sysmon_started

With this our Active Directory segment is pretty much ready. The only part left right now is to install our splunk server and install splunk universal forwarder on our server and to the Windows 10 machine. Both the things will be covered in the part two.
For any troubleshooting help feel free to reach out to me on my socials.