Active Directory Attacks

Active Directory Attacks

Comprehensive Active Directory attack techniques including Kerberoasting, AS-REP Roasting, NTLM relay, ACL abuse, and ticket attacks for red team operations.

Dec 11, 2025
Updated Dec 11, 2025
2 min read

Overview

Active Directory (AD) is the backbone of enterprise Windows environments and a primary target for attackers. Compromising AD often leads to complete domain control, making these techniques essential for penetration testers and red teamers.

Kerberos Attacks

Kerberos authentication provides multiple attack vectors:

Relay Attacks

Permission Abuse

Attack Methodology

Phase 1: Enumeration

Use BloodHound and PowerView to map the domain:

  • Trust relationships
  • Group memberships
  • ACL misconfigurations
  • Kerberoastable accounts

Phase 2: Initial Access

  • Password spraying
  • Credential harvesting
  • Phishing for domain credentials

Phase 3: Privilege Escalation

  • Target service accounts via Kerberoasting
  • Abuse ACL misconfigurations
  • Exploit trust relationships

Phase 4: Lateral Movement

  • Use Impacket for remote execution
  • Pass-the-Hash/Ticket attacks
  • RDP/WinRM with compromised credentials

Phase 5: Persistence

  • Golden/Silver ticket creation
  • DC Shadow attacks
  • ACL backdoors

Tools Reference

ToolPrimary Use
BloodHoundAttack path visualization
PowerViewAD enumeration and exploitation
ImpacketProtocol-level attacks
HashcatCrack Kerberos tickets

Last updated on

Active Directory Attacks | Drake Axelrod