Active Directory Lab using Hyper-V Virtualization Platform
4.3 (818 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
12,532 students enrolled

Active Directory Lab using Hyper-V Virtualization Platform

Setup a Active Directory lab on a single machine using Microsoft's Hyper-V platform and monitor using Elastic stack.
4.3 (818 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
12,532 students enrolled
Last updated 9/2017
English
English [Auto-generated]
Price: Free
This course includes
  • 2 hours on-demand video
  • 3 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What you'll learn
  • Learn how to setup Hyper-V in Windows 10
  • Learn how to setup a domain controller

  • Learn how to set up Active Directory

  • Build a home lab for practicing Active Directory and hacking skills
  • How to join systems to a Domain
  • Learn how to setup DHCP server
  • Learn how to install PFsense router/firewall and how to configure firewall rules
  • How to secure host system from Virtual machines using PFSense
  • Basic networking concepts
  • Learn about Group Policy Objects
  • How to create local users using a GPO
  • How to creating security related group policies
  • Windows monitoring using Elastic stack (Elastic, Kibana, and Logstash)
Requirements
  • You don't need to know anything. I'll hold you by the hand and show you how to do everything step by step from beginning to end.
  • Windows 2012 data center edition iso image - trial version can be downloaded from Microsoft.
  • Windows 10 iso image - trial version can be downloaded from Microsoft
  • Windows 7
Description

***********************************************************Update**********************************************************************************************************************

Free download of 100 page manual providing step-by-step instructions for setting up the lab. Will be adding tutorials before 9/30 on how to monitor Windows network using Elastic Stack. Will setup Kali, Ubuntu, Elastic, Kibana, and Logstash. Logs will be forwarded from Windows system to Elastic, and dashboards with metrics and charts will be created in Kibana. 

******************************************************************************************************************************************************************************************

In this course, I'm going to show you how to setup a production like Active Directory lab with many client systems. All this is done on one host computer running Windows 10. Whether you are interested in learning about Windows administration, need a platform to test your hacking techniques, or want to test your software in a variety of operating systems, this course will help you do just that! 


Setting up a secure active directory home lab is an uphill task for any newbie IT professionals, but it is an absolute requirement for anyone getting into the IT or security field to have a playground for learning purposes. This video series is one of the most authoritative and detailed step-by-step instructions on how to set up an active directory based hacking lab. In this comprehensive video series, I’ll show you how to install and configure a lab from scratch using Hyper-V technologies. I made an informed decision to move away from VMWare technologies, as it was very expensive! Since I was starting from scratch, I thought of recording the whole process, so anyone trying to accomplish the same goals will be benefited. The entire lab is set up in one machine with an i7 chipset, 16GB ram, and 256 GB SSD. All the internal lab machines will have full internet connectivity. We will configure PFsense firewall between lab network and the host system, which will protect the host from any malware infection by the lab systems. I recommend following the tutorials in the same order as laid out in the video series. At the end of the series, you will have a lab similar to the one shown in the course video. I’ll use the same lab for my other hacking and pentesting training which is the development process.  I promise that you will learn a lot by following this series. Strap your belts and get ready for an exciting ride!

Who this course is for:
  • Students with passion in IT and looking for simple instructions to set up active directory based home lab
  • Anyone trying to get Microsoft certified
  • Anyone who wants to learn Active Directory and how to set it up step-by-step
  • Learn about Microsoft's Hyper-V virtualization platform
  • Anyone struggling to setup a home lab for practicing the skills
  • Anyone with passion in security and need a hacking lab
Course content
Expand all 22 lectures 02:13:26
+ Introduction - Lab Setup
18 lectures 01:45:16

Introduction to what will be covered in this course. High level overview using a basic network diagram.

Welcome to my Course
03:08

Hyper-V is a pre-requisite for setting up the active directory pentest lab. Before installing Hyper-V, remove VMware/VirtualBox, as it not compatible with Hyper-V. Hyper-V is enabled in the “Turn Windows features on or off” section as outlined below. Download the manual from resources section to follow along. 

Adding Hyper-V Role in Windows 10
01:47

In Hyper-V, we will create two switches “Private” and “External.” The External switch is used for internet connectivity, and the Internal switch is for internal network communications. Download the manual from resources section to follow along. 

Setting up Virtual Switches in Hyper-V
02:25

In this tutorial, we will install Windows 2102 server which will later be promoted to Domain Controller. Download the trial version from Microsoft site: https://www.microsoft.com/en-US/evalcenter/evaluate-windows-server-2012-r2

Download the manual from resources section to follow along. 

Installing Windows 2012 Server
05:09

In this tutorial, we will see how to install Windows 10 client operating system. Later on, this system will to joined to domain.  Download trial version from Microsoft site: https://www.microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise

Installing Windows 10–64 bit version
06:07

In this tutorial, we will see how to install Windows 7 client operating system. Later on, this system will to joined to domain.  

Installing Windows 7
05:13

In this tutorial, we will see how to install File Server Windows 2012 server operating system. Later on, this system will to joined to domain.  

File Server Installation – Windows 2012
09:13

pfSense is an open source firewall/router computer software distribution based on FreeBSD. It is installed on a computer to make a dedicated firewall/router for a network and is noted for its reliability and offering features often only found in expensive commercial firewalls. It can be configured and upgraded through a web-based interface, and requires no knowledge of the underlying FreeBSD system to manage. pfSense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and as a VPN endpoint. 

Installing Router/Firewall using PFSense Opensource Software
09:26

PFSense must be configured prior to configuring our pentest lab. From Windows 2012 system or any other lab systems, open explorer and go to https://192.168.1.1

Default user name/password is admin/pfsense to login to web console.

Configuring PFSense Router for networking
05:55

Let’s promote Windows 2012 to Domain Controller. This server will act as Active Directory, DNS, and DHCP server in our network. We can create/delete user accounts, enforce security policies, and manage systems from one centralized location.

Promoting Windows 2012 Server to a Domain Controller
10:52

Since all system communicate with the Domain Controller, it is strongly recommended to have static ip for the DC. In this tutorial, we will see how to set static IP.

Setting Up Static IP in Domain Controller
02:25

Our domain controller will hand out IPs to all systems in the local network. In this tutorial, we will see how to enable DHCP role using the "Server Manager"

Add DHCP Role to Domain Controller
02:44

Let's see how to create DHCP scopes which will be used to hand out IPs to clients in the local network. 

Creating a scope in DHCP server to hand out IPs to clients
04:34

We will join the Windows 7 system to domain, so all system can be managed centrally. 

Joining Windows 7 to Domain
07:15

We will join the Windows 10 system to domain, so all system can be managed centrally.

Joining Windows 10 to Domain
06:04

We will join the FileServer system to domain, so all system can be managed centrally.

Adding FileServer to Domain
08:46

Let's see how to export and create snapshots. We can restore or import from these back up files. 

Exporting, Saving, and creating Checkpoints for all VMs
05:44

Since the internal lab systems can communicate with the HOST system, malware and viruses can propagate and infect the host system. In this tutorial, we will see how to protect the host system by using firewall rules in PFSense. 

Protect you host computer using PFSense
08:29
+ Group Policy Objects (GPO)
3 lectures 26:05

Group Policy Object is one of the most powerful feature within Active Directory. We will see few examples in this section. In this we will see how to enforce same wall paper on all client systems. 

Example 1: Set Wallpaper on all systems in the domain.
08:48

Group Policy Object is one of the most powerful feature within Active Directory. We will see few examples in this section. In this we will see how to add domain groups to local groups on all client systems. 

Example 2: Add Domain Groups to Local Administrators Group
10:01

Group Policy Object is one of the most powerful feature within Active Directory. In this we will see how to enforce few security policies. 

Example 3: Enforce Security Policies - Timeout and Event Logging
07:16
+ Conclusion
1 lecture 02:05

I want to sincerely thank everyone for taking this course. Hope you all learned something and found it useful. I'll be creating few other security related course very soon. Mostly on the pentesting side. Please let me know if you're interested in any specific topic. 

Conclusion
02:05