
The highest level in the logical hierarchy of Active Directory (AD) is the forest. A forest refers to a completely independent Active Directory organization, possessing a specific set of attributes and serving as the organization’s security perimeter.
A forest can include one or multiple domains. All objects created within a forest share a common set of attributes. For example, a “user” object contains a first name, last name, address, phone number, group membership information, and other parameters. By modifying this set, we change it for all objects in the forest. This set is called the AD schema. It describes all the objects we can create and their structure.
By default, the first domain created in a forest is considered its root domain. A domain refers to a logical grouping of users and computers that supports centralized administration and security settings. It also serves as a replication unit—all domain controllers within a domain must participate in replication with one another.
Domains are typically named using the DNS namespace. Trust, in turn, is the relationship between two domains that enables permissions for accessing certain objects in another domain. A tree is simply a collection of domains that use connected namespaces. For example, if a domain is named example.com, then a child domain might be test.example.com. In summary, you can visualize this hierarchy as “Forest — Tree — Domain.”

Most organizations typically use a very basic structure: a single forest with a root domain that contains various objects like users and computers. A more complex structure is mainly found in large companies that have a substantial IT workforce and different levels of responsibility. Often, only architects have full access rights, while regular administrators have rights limited to their own domains.
That covers the initial terminology. In one of the upcoming issues, I’ll discuss the types of trust relationships.

2022.06.01 — Cybercrime story. Analyzing Plaso timelines with Timesketch
When you investigate an incident, it's critical to establish the exact time of the attack and method used to compromise the system. This enables you to track the entire chain of operations…
Full article →
2022.02.09 — Dangerous developments: An overview of vulnerabilities in coding services
Development and workflow management tools represent an entire class of programs whose vulnerabilities and misconfigs can turn into a real trouble for a company using such software. For…
Full article →
2023.02.21 — Pivoting District: GRE Pivoting over network equipment
Too bad, security admins often don't pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What…
Full article →
2022.01.12 — Post-quantum VPN. Understanding quantum computers and installing OpenVPN to protect them against future threats
Quantum computers have been widely discussed since the 1980s. Even though very few people have dealt with them by now, such devices steadily…
Full article →
2022.06.03 — Vulnerable Java. Hacking Java bytecode encryption
Java code is not as simple as it seems. At first glance, hacking a Java app looks like an easy task due to a large number of available…
Full article →
2023.07.07 — Evil Ethernet. BadUSB-ETH attack in detail
If you have a chance to plug a specially crafted device to a USB port of the target computer, you can completely intercept its traffic, collect cookies…
Full article →
2023.03.26 — Poisonous spuds. Privilege escalation in AD with RemotePotato0
This article discusses different variations of the NTLM Relay cross-protocol attack delivered using the RemotePotato0 exploit. In addition, you will learn how to hide the signature of an…
Full article →
2022.06.01 — F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows
Is the phrase "This script contains malicious content and has been blocked by your antivirus software" familiar to you? It's generated by Antimalware Scan Interface…
Full article →
2022.02.09 — Kernel exploitation for newbies: from compilation to privilege escalation
Theory is nothing without practice. Today, I will explain the nature of Linux kernel vulnerabilities and will shown how to exploit them. Get ready for an exciting journey:…
Full article →
2022.02.09 — F#ck da Antivirus! How to bypass antiviruses during pentest
Antiviruses are extremely useful tools - but not in situations when you need to remain unnoticed on an attacked network. Today, I will explain how…
Full article →