Exploiting Active Directory
This phase exploits misconfigurations to perform a combination of lateral movement and privilege escalation until we reach a suitable position to execute our goals, as shown in the diagram below.

In this network, we will cover several methods that can be used to exploit AD misconfigurations. This is by no means a complete list, as available methods are usually highly situational and dependent on the AD structure and environment. However, we will cover the following techniques for exploiting AD:
AD Delegation
Forcing Authentication Relays
Group Policy Objects
Targeting AD Users
Domain Trusts
Silver and Golden Tickets
Last updated