Complete Guide
🔥 Advanced

Active Directory Attack Paths

Active Directory is the backbone of enterprise identity management. This guide covers advanced techniques for identifying and exploiting attack paths to compromise the domain.

What You'll Learn

  • Kerberos protocol exploitation
  • Delegation abuse techniques
  • ACL misconfiguration exploitation
  • BloodHound attack path analysis

Attack Categories

Essential Tools

Impacket

Docs

Collection of Python classes for working with network protocols. Essential for AD attacks.

BloodHound

Docs

Single Page Application for visualising Active Directory trust relationships.

Rubeus

Docs

C# toolset for raw Kerberos interaction and abuses.

Mimikatz

Docs

A tool to play with Windows security (extracting passwords, tickets, etc.).

PowerView

Docs

PowerShell tool to gain network situational awareness on Windows domains.

PetitPotam

Docs

Tool to coerce Windows hosts to authenticate to other machines.

Certify

Docs

C# tool to enumerate and abuse Active Directory Certificate Services (AD CS).

⚠️ Legal Disclaimer

Active Directory attacks should only be performed on systems you own or have explicit written authorization to test. Unauthorized access to computer systems is illegal.