Categories
Domain Enumeration
Techniques and tools for mapping out Active Directory domains, discovering users, groups, and other valuable information.
Lateral Movement
Techniques for moving laterally within a compromised network to gain further access and privileges in an Active Directory environment.
Privilege Escalation
Methods for escalating privileges within an Active Directory domain, including exploitation of misconfigurations and vulnerabilities.
Persistence
Methods and techniques for maintaining long-term access to compromised systems and networks within Active Directory.
Credential Theft
Techniques for stealing and exploiting user credentials in Active Directory environments.
Group Policy Attacks
Techniques for abusing and exploiting Group Policy Objects (GPOs) in Active Directory.
Kerberos Attacks
Exploits and attacks targeting the Kerberos authentication protocol used in Active Directory.
AD CS Attacks
Methods for exploiting misconfigurations and vulnerabilities in Active Directory Certificate Services.
Defensive Techniques
Best practices, tools, and methodologies for defending against various Active Directory attacks and improving overall AD security.
Trust Relationship Attacks
Techniques for exploiting and abusing trust relationships between domains and forests in Active Directory.
LDAP-based Attacks
Attacks that exploit vulnerabilities in LDAP implementations and misconfigurations in Active Directory.
DNS Attacks
Techniques for exploiting DNS in Active Directory environments, including DNS spoofing and cache poisoning.
Misconfiguration Exploitation
Methods for identifying and exploiting common misconfigurations in Active Directory setups.
Active Directory Forensics
Techniques and tools for conducting forensic analysis in Active Directory environments after a security incident.
Cloud AD Integration Attacks
Attacks targeting hybrid and cloud-integrated Active Directory environments, including Azure AD.
Windows Evasion Techniques
Explore advanced techniques for evading detection and bypassing security controls in Windows environments, including Active Directory.
SCCM Attacks
Techniques for exploiting vulnerabilities and misconfigurations in System Center Configuration Manager (SCCM) within Active Directory environments.
Exchange Attacks
Techniques for exploiting vulnerabilities and misconfigurations in Microsoft Exchange Server within Active Directory environments.
MSSQL Attacks
Techniques for exploiting vulnerabilities and misconfigurations in Microsoft SQL Server within Active Directory environments.
Trusts Attacks
Advanced techniques for exploiting and abusing trust relationships between domains, forests, and external entities in Active Directory environments.
Ad: horizontal