Active Directory Security

AD Basics

AD centralizes identity and policy management across enterprise Windows environments using domains, users, groups, and organizational units.

Kerberoasting

Extract TGS tickets for service accounts and crack offline.

Pass-the-Hash

Reuse NTLM hash to authenticate without plaintext credentials.

Visual Attack Path

Initial foothold -> local admin -> domain user token -> service account abuse -> domain controller access.