CG
SkillsPerforming Active Directory Compromise Investigation
Start Free
Back to Skills Library
Incident Response🟡 Intermediate

Performing Active Directory Compromise Investigation

Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.

4 min read4 code examples

Performing Active Directory Compromise Investigation

Overview

Active Directory (AD) compromise investigation is a critical incident response capability that focuses on identifying how attackers gained access to domain services, what persistence mechanisms they established, and the scope of credential compromise. Since 88% of breaches involve compromised credentials (Verizon 2025 DBIR), AD is the primary target for enterprise-wide attacks. Investigators must analyze NTDS.dit database integrity, Kerberos ticket-granting activity, Group Policy modifications, replication metadata, and privileged group membership changes to reconstruct the attack chain and determine full compromise scope.

Key Investigation Areas

1. NTDS.dit Database Analysis

The NTDS.dit file is the core Active Directory credential database containing all password hashes for domain accounts. Attackers commonly exfiltrate this file using tools like ntdsutil, secretsdump.py, or DCSync attacks via Mimikatz.

Detection indicators:

  • Event ID 4662: Access to directory service objects with replication permissions
  • Event ID 4742: Computer account modifications on domain controllers
  • Volume Shadow Copy creation on domain controllers (Event ID 8222)
  • Unusual ntdsutil.exe or vssadmin.exe execution
  • Replication traffic from non-DC sources (DCSync detection)

2. Kerberos Attack Detection

Golden Ticket indicators:

  • TGT tickets with abnormally long lifetimes (default is 10 hours)
  • Event ID 4769 with encryption type 0x17 (RC4) instead of AES
  • TGT issued without corresponding Event ID 4768 (AS-REQ)
  • Kerberos tickets referencing non-existent or disabled accounts

Silver Ticket indicators:

  • Service tickets without corresponding TGT requests
  • Event ID 4769 with unusual service names
  • Tickets with forged PAC data

Kerberoasting indicators:

  • High volume of Event ID 4769 for service accounts
  • RC4 encryption requests for accounts that support AES
  • Requests from workstations not normally accessing those services

3. Group Policy Abuse

  • GPO modifications granting new privileges (Event ID 5136)
  • Scheduled task deployment via GPO
  • Software installation policies added to domain
  • Login script modifications
  • Registry-based policy changes for persistence

4. Privileged Group Enumeration

Track modifications to these critical groups:

  • Domain Admins, Enterprise Admins, Schema Admins
  • Account Operators, Backup Operators
  • DnsAdmins (can execute arbitrary DLLs on DCs)
  • Group Policy Creator Owners
  • Protected Users group membership changes

5. Trust Relationship Analysis

  • New forest/domain trusts created (Event ID 4706)
  • SID History injection for privilege escalation
  • Trust ticket forgery indicators
  • Cross-domain authentication anomalies

Investigation Methodology

Phase 1: Scoping and Evidence Collection

1. Identify potentially compromised domain controllers
2. Collect Security, System, Directory Service event logs
3. Extract AD replication metadata using repadmin
4. Capture ntdsutil snapshots for offline analysis
5. Collect DNS server logs and zone transfer records
6. Export Group Policy Object configurations
7. Document current privileged group memberships

Phase 2: Authentication Log Analysis

1. Parse Event ID 4624/4625 for logon patterns
2. Identify pass-the-hash indicators (Event ID 4624 Type 3 with NTLM)
3. Analyze Event ID 4768/4769/4771 for Kerberos anomalies
4. Review Event ID 4776 for NTLM authentication failures
5. Cross-reference logon events with known compromised accounts
6. Map lateral movement paths through authentication chains

Phase 3: Persistence and Backdoor Detection

1. Enumerate AdminSDHolder ACL modifications
2. Check for SID History abuse on accounts
3. Verify krbtgt account password age
4. Audit DSRM password configuration
5. Check for skeleton key malware indicators
6. Review AD Certificate Services for rogue certificates
7. Validate DNS records for poisoning

Phase 4: Remediation Planning

1. Double-rotate krbtgt password (wait replication between rotations)
2. Reset all compromised account passwords
3. Remove unauthorized privileged group members
4. Revoke rogue certificates if AD CS compromised
5. Rebuild domain controllers from clean media if needed
6. Implement tiered administration model
7. Enable Protected Users group for privileged accounts

Critical Event IDs for AD Investigation

Event IDSourceDescription
4624SecuritySuccessful logon
4625SecurityFailed logon
4648SecurityExplicit credential logon
4662SecurityOperation on AD object
4768SecurityKerberos TGT requested
4769SecurityKerberos service ticket requested
4771SecurityKerberos pre-authentication failed
4776SecurityNTLM credential validation
5136SecurityDirectory object modified
5137SecurityDirectory object created
4706SecurityTrust created
4707SecurityTrust removed
4742SecurityComputer account changed
8222SystemShadow copy created

Tools for AD Investigation

ToolPurpose
BloodHoundAttack path mapping and privilege escalation analysis
PingcastleAD security assessment and risk scoring
Purple KnightAD vulnerability scanning by Semperis
ADReconActive Directory data gathering
MimikatzCredential extraction and Kerberos analysis
ImpacketDCSync detection and NTLM relay analysis
VelociraptorRemote forensic artifact collection
Timeline ExplorerEvent log timeline analysis

MITRE ATT&CK Mapping

TechniqueIDRelevance
DCSyncT1003.006NTDS.dit credential extraction
Golden TicketT1558.001Kerberos TGT forgery
Silver TicketT1558.002Service ticket forgery
KerberoastingT1558.003Service account hash extraction
Pass-the-HashT1550.002NTLM hash reuse
Group Policy ModificationT1484.001Persistence via GPO
Account ManipulationT1098Privileged group changes
SID-History InjectionT1134.005Privilege escalation

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.3 (Incident Identification), CC7.4 (Incident Response), CC7.5 (Recovery)
  • ISO 27001: A.16.1 (Security Incident Management)
  • NIST 800-53: IR-1 through IR-10 (Incident Response Family)
  • NIST CSF: RS.RP (Response Planning), RS.CO (Communications), RC.RP (Recovery Planning)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add performing-active-directory-compromise-investigation

# Or load dynamically via MCP
grc.load_skill("performing-active-directory-compromise-investigation")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

References

  • CISA: Detecting and Mitigating Active Directory Compromises
  • Microsoft: Total Identity Compromise IR Lessons
  • Semperis: Top 10 Active Directory Risks
  • Fidelis: Active Directory Compromise Response

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add performing-active-directory-compromise-investigation
// Or via MCP
grc.load_skill("performing-active-directory-compromise-investigation")

Tags

active-directorycompromise-investigationidentity-forensicskerberoslateral-movementdfirntds-ditgolden-ticket

Related Skills

Threat Hunting

Detecting Golden Ticket Attacks in Kerberos Logs

3m·intermediate
Threat Detection

Detecting Golden Ticket Forgery

3m·intermediate
Incident Response

Building Incident Timeline with Timesketch

4m·intermediate
Incident Response

Collecting Volatile Evidence from Compromised Host

5m·intermediate
Incident Response

Containing Active Breach

6m·intermediate
Incident Response

Eradicating Malware from Infected Systems

4m·intermediate

Skill Details

Domain
Incident Response
Difficulty
intermediate
Read Time
4 min
Code Examples
4

On This Page

OverviewKey Investigation AreasInvestigation MethodologyCritical Event IDs for AD InvestigationTools for AD InvestigationMITRE ATT&CK MappingReferencesVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →