Comprehensive Coverage
Active Directory History
Trace AD from its Windows NT Domain origins through Windows 2000's launch to modern hybrid environments. Understanding its evolution from simple directory service to complex identity infrastructure reveals why many attack techniques exploit decades-old design decisions. Key milestones include major security vulnerabilities, the rise of public attack research (2014-present), and the shift toward Azure AD/Entra ID integration.
FoundationAD Fundamentals
Master the core architecture: forests, domains, organizational units, domain controllers, and FSMO roles. Understand security principals, SIDs, Group Policy Objects, trust relationships, LDAP structure, and directory schema. Essential foundation before tackling offensive or defensive techniques.
AuthenticationAuthentication Protocols
Deep dive into Kerberos (TGT, TGS, service tickets, PAC validation), NTLM (v1 vs v2), LDAP/LDAPS authentication, PKINIT certificate-based auth, and modern authentication integrations like SAML. Understanding these protocols is critical for both attack and defense.
Basic AttacksFoundational Attacks
Essential techniques every security professional must master: Kerberoasting and AS-REP Roasting for credential extraction, Pass-the-Hash and Pass-the-Ticket for lateral movement, DCSync for domain replication abuse, and Golden/Silver Ticket attacks for persistence. These are the building blocks of AD exploitation.
CoercionCoercion & Relay Attacks
Force authentication from high-value targets using PrinterBug, PetitPotam, and DFSCoerce, then relay captured authentication to ADCS web endpoints or LDAP/LDAPS for privilege escalation. Includes WebClient coercion techniques and WebDAV abuse for optimal attack chains.
DelegationDelegation Abuse
Exploit delegation configurations (Unconstrained, Constrained, and Resource-Based Constrained Delegation) for privilege escalation. Covers Shadow Credentials attacks via Key Trust abuse, S4U2Self/S4U2Proxy mechanics, and cross-domain delegation exploitation for lateral movement.
CertificatesAD Certificate Services (ADCS)
Exploit ADCS misconfigurations for domain takeover. Covers ESC1-ESC16 techniques including misconfigured certificate templates, enrollment agent abuse, vulnerable access controls, NTLM relay to HTTP endpoints, and the September 2025 strong certificate binding enforcement deadline.
Permissions & PolicyACL & Group Policy Abuse
Leverage ACL misconfigurations (GenericAll, GenericWrite, WriteDACL, ForceChangePassword) and Group Policy exploitation (GPO modification, scheduled tasks, SYSVOL credential mining) for privilege escalation and persistence. Includes AdminSDHolder backdoor techniques and DACL-based persistence mechanisms.
Latest Attack Techniques
Cutting-edge research and recent CVEs: NTLM LDAP auth bypass (CVE-2025-54918), MSSQL privilege escalation (CVE-2025-49758), ADCS to HTTPS WSUS (CVE-2025-33073), Kerberos relay via CNAME abuse, Azure AD/Entra ID hybrid attacks, forest trust exploitation, SID history injection, and Bronze Bit techniques.
Defense & Detection
Build resilient AD infrastructure through tiered administration models, Privileged Access Workstations (PAWs), LAPS deployment, just-in-time access controls, Protected Users group configuration, detection engineering strategies, and BloodHound-informed defensive hardening.
Entra ID Fundamentals
Master Microsoft's cloud identity platform (formerly Azure AD): tenant architecture, user and group management, authentication methods, Conditional Access policies, Privileged Identity Management (PIM), and hybrid identity with Azure AD Connect. Essential foundation for modern identity security.
Microsoft 365 Security
Secure the Microsoft 365 ecosystem: Exchange Online protection, SharePoint/OneDrive security, Teams governance, Defender for Office 365, Data Loss Prevention (DLP), sensitivity labels, and compliance features. Understand how M365 integrates with Entra ID and on-premises AD in hybrid environments.
Essential Tooling
Master the critical offensive and defensive tools: BloodHound for attack path analysis, Mimikatz for credential extraction, Rubeus for Kerberos attacks, Impacket for protocol implementations, Certify/Certipy for ADCS auditing, and PowerView/SharpView for domain enumeration and reconnaissance.
Hands-On Labs
Practice in controlled environments using purpose-built vulnerable labs like GOAD (Game of Active Directory) and VulnAD. Learn to build your own AD testing environment, walk through realistic attack scenarios, complete CTF-style challenges, and develop blue team detection capabilities.