Back to all modules

Compromising Active Directory

Learn and exploit Active Directory networks through core security issues stemming from misconfigurations.

Approximately 90% of the Global Fortune 1000 companies use Active Directory (AD). If an organisation's estate uses Microsoft Windows, you are almost guaranteed to find AD. Since AD is used for Identity and Access Management of the entire estate, it holds the keys to the kingdom, making it a very likely target for attackers. This module will teach you the basics of AD and take you on the typical journey of compromising AD during a red team. You will learn to breach AD, enumerate AD, exploit AD, and finally deploy persistence through AD.

Loading...

Loading rooms...

Need to know
Next Steps

What are modules?

A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

Learning Structure Diagram