Provide comprehensive techniques for attacking Microsoft Active Directory environments. Covers reconnaissance, credential harvesting, Kerberos attacks, lateral movement, privilege escalation, and domain dominance for red team operations and penetration testing.
| BloodHound | AD attack path visualization | | Impacket | Python AD attack tools | | Mimikatz | Credential extraction | | Rubeus | Kerberos attacks | | CrackMapExec | Network exploitation | | PowerView | AD enumeration | | Responder | LLMNR/NBT-NS poisoning |
Extract credentials directly from DC (requires Replicating Directory Changes rights):
Questa competenza deve essere utilizzata quando l'utente chiede di "attaccare Active Directory", "sfruttare AD", "Kerberoasting", "DCSync", "pass-the-hash", "enumerazione BloodHound", "Golden Ticket", "Silver Ticket", "roasting AS-REP", "inoltro NTLM" o necessita di indicazioni sui test di penetrazione del dominio Windows. Fonte: automindtechnologie-jpg/ultimate-skill.md.