Active Directory (AD) remains one of the most targeted environments in enterprise networks. This section covers offensive AD techniques from initial enumeration to full domain compromise, organized by attacker platform.

The same attack often looks very different depending on whether you are operating from a Linux/Kali machine (remote, unauthenticated or with stolen credentials) or from a Windows foothold (on-domain, local admin, or higher privileges). Understanding both perspectives is essential for both red teamers and defenders.


SectionDescription
From Kali / LinuxRemote enumeration and exploitation using Impacket, BloodHound, NetExec, Certipy and other Linux-native tools
From WindowsOn-host attacks using PowerView, Rubeus, Mimikatz, SharpHound, and living-off-the-land techniques

Disclaimer: For educational purposes only. Unauthorized access to computer systems is illegal.


Further Reading

These notes are personal field references. For broader coverage, authoritative community resources:

ResourceDescription
WADComsInteractive cheat sheet โ€” filter by OS, service, attack type, and what you have
HackTricks โ€” AD MethodologyComprehensive AD attack methodology reference
HackTricks โ€” Pentesting ADLDAP and AD enumeration techniques
AD Mindmap (SVG)Full Active Directory attack mindmap โ€” open in browser or Excalidraw