AD Lab

Active Directory Attack Path Lab

Setting up a multi-host Active Directory environment using VMWare workstation and Windows 10.

Date: Apr 23, 2026 Status: In Progress
Windows 10 Enterprise Windows Server 2022 Attack Lab Active Directory Multi-host
Problem
We need a safe, controlled environment to practice various Active Directory attack paths, exploits, and vulnerabilities.
Approach
Using VM Ware Workstation, we will create a multi-host Active Directory environment composed of one Domain Controller (Windows Server 2022) VM and two client workstation VMs (Windows 10 Enterprise). This setup will allow us to study the Active Directory environment and exploit its native features and vulnerabilities.
Stack
  • VMWare Workstation Pro (Hypervisor)
  • Windows 10 Enterprise (Workstation/Client Machines)
  • Active Directory (Windows Server 2022)
  • Kali Linux (Attack VM)

Overview

One of the bigger hurdles to learning how to hack is finding vulnerable hosts that you have permission to hack. There are some incredible sites out there, like HackTheBox, TryHackMe, OffSec, & VulnHub, that provide intentionally vulnerable machines to practice on. Many of these machines are single-host machines designed for a single attack path and the ones that aren't are usually behind a paywall.

HackTheBox, for example, has their Pro Labs, a series of labs designed to simulate a larger enterprise environment with multiple hosts, subnets, and even multiple DCs. I completed the Dante lab a few months back and girl did I learn a lot! Dante is listed as "Easy", but it was rough. Fun, but rough. I learned that I need a lot more practice with Buffer Overflows, but thats a story for another day.