Mythic C2 Framework - Complete Active Directory Attack Chain Full demonstration of using Mythic C2 framework to execute a complete Active Directory attack chain, from initial access to domain compromise.
What is Mythic? Mythic is a collaborative, multi-platform Command & Control (C2) framework designed for red team operations. It provides a web-based interface for managing agents, tracking operations, and executing complex attack chains across enterprise environments.
Attack Chain Overview This tutorial demonstrates a complete Active Directory compromise using Mythic C2:
Enumeration Starting with a comprehensive nmap scan to discover all open ports and services:
sudo nmap -sS -sC -A 10.10.11.202 -T4 -oN first.scan -p- -Pn Key Findings The scan reveals a Windows Domain Controller running multiple services:
Port 53: DNS Port 88: Kerberos Port 389/636: LDAP (Domain: sequel.htb) Port 445: SMB Port 1433: Microsoft SQL Server 2019 Port 5985: WinRM Domain identified: sequel.htb with hostname dc.sequel.htb
SMB Enumeration Checking SMB shares as a guest user: