Compromising Active Directory

Learn and exploit Active Directory networks through core security issues stemming from misconfigurations.
Approximately 90% of the Global Fortune 1000 companies use Active Directory (AD). If an organisation's estate uses Microsoft Windows, you are almost guaranteed to find AD. Since AD is used for Identity and Access Management of the entire estate, it holds the keys to the kingdom, making it a very likely target for attackers. This module will teach you the basics of AD and take you on the typical journey of compromising AD during a red team. You will learn to breach AD, enumerate AD, exploit AD, and finally deploy persistence through AD.

0%
Active Directory Basics
This room will introduce the basic concepts and functionality provided by Active Directory.
0%
Breaching Active Directory
This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.
0%
Enumerating Active Directory
This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.
0%
Lateral Movement and Pivoting
Learn about common techniques used to move laterally across a Windows network.
0%
Exploiting Active Directory
Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.
0%
Persisting Active Directory
Learn about common Active Directory persistence techniques that can be used post-compromise to ensure the blue team will not be able to kick you out during a red team exercise.
0%
Credentials Harvesting
Apply current authentication models employed in modern environments to a red team approach.
Need to know
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
