Active Directory Attacks Cheatsheet
Quick reference for AD enumeration, Kerberos attacks, lateral movement, and domain compromise.
Quick reference for AD enumeration, Kerberos attacks, lateral movement, and domain compromise.
Step-by-step methodology for attacking Active Directory — the chain I follow on every AD box.
How I set up and use BloodHound CE for AD enumeration — collection, import, and finding attack paths.
My first AD box ever. Null session on SMB → GPP password in SYSVOL → Kerberoasting the Administrator → Domain Admin.
Hard AD box. AS-REP Roasting → BloodHound → ForceChangePassword → lsass.DMP → SeBackupPrivilege → VSS snapshot → NTDS.dit → Domain Admin.
Second AD box. AS-REP Roasting with no creds, BloodHound attack path through 5 nested groups, ACL abuse to DCSync.