Active Directory - Breaching
OSINT & Phishing
Two popular methods for gaining access to that first set of AD credentials is Open Source Intelli...
NTLM Authenticated Services
NTLM and NetNTLM New Technology LAN Manager (NTLM) is the suite of security protocols used to au...
LDAP Bind Credentials
LDAP Another method of AD authentication that applications can use is Lightweight Directory Acce...
Authentication Relays
Continuing with attacks that can be staged from our rogue device, we will now look at attacks aga...
Microsoft Deployment Toolkit (MDT)
Large organisations need tools to deploy and manage the infrastructure of the estate. In massive ...
Configuration Files
The last enumeration avenue we will explore in this network is configuration files. Suppose you w...
Conclusion
A significant amount of attack avenues can be followed to breach AD. We covered some of those com...