Unauthenticated Enumeration
Everything you can pull from an AD environment without a single credential. Network discovery, null sessions, guest access, and protocol-level enumeration.
Active Directory cheatsheet for red teamers and pentesters. Organized by attack phase, built around modern tooling.
Everything you can pull from an AD environment without a single credential. Network discovery, null sessions, guest access, and protocol-level enumeration.
You have creds (password, hash, or ticket). Time to map the entire domain. Pull users, groups, ACLs, delegations, trusts, certificates, and everything BloodHound needs.
You've enumerated the domain. Now it's time to harvest, crack, relay, and dump credentials to expand your access.
You have credentials, hashes, or tickets. Time to move through the network, hop between hosts, and reach high-value targets.
You have a foothold. Now escalate from a low-privilege domain user to Domain Admin (or equivalent). ACL abuse, delegation attacks, AD CS, Shadow Credentials, and coercion chains.
You have Domain Admin (or equivalent). Now maintain access, extract everything of value, and establish persistence that survives password resets and remediation attempts.