Active Directory Mindmap

Explore various aspects of Active Directory through the sections below or visit the external AD mindmap.

No Credentials
No Credentials techniques and commands for Active Directory security assessment.
Valid User (No Password)
Valid User (No Password) techniques and commands for Active Directory security assessment.
Valid Credentials (cleartext creds, nt hash, kerberos ticket)
Valid Credentials (cleartext creds, nt hash, kerberos ticket) techniques and commands for Active Directory security assessment.
Low access (Privilege escalation)
Low access (Privilege escalation) techniques and commands for Active Directory security assessment.
Kerberos Delegation
Kerberos Delegation techniques and commands for Active Directory security assessment.
Admin Access
Admin Access techniques and commands for Active Directory security assessment.
Domain Admin
Domain Admin techniques and commands for Active Directory security assessment.
Quick Compromise
Quick Compromise techniques and commands for Active Directory security assessment.
Man In The Middle (Listen and Relay)
Man In The Middle (Listen and Relay) techniques and commands for Active Directory security assessment.
Crack Hash
Crack Hash techniques and commands for Active Directory security assessment.
Know vulnerabilities authenticated
Know vulnerabilities authenticated techniques and commands for Active Directory security assessment.
ACLs/ACEs permissions
ACLs/ACEs permissions techniques and commands for Active Directory security assessment.
ADCS
ADCS techniques and commands for Active Directory security assessment.
SCCM
SCCM techniques and commands for Active Directory security assessment.
Lateral Movement
Lateral Movement techniques and commands for Active Directory security assessment.
Trusts
Trusts techniques and commands for Active Directory security assessment.
Persistence
Persistence techniques and commands for Active Directory security assessment.

Reference