- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Security
Active Directory Exploitation
The Active Directory Exploitation path covers attackers target, exploit, and abuse weaknesses in Active Directory (AD) environments to escalate privileges, gain unauthorized access, and move laterally within a network. This path explores techniques such as credential dumping, pass-the-hash, Kerberos ticket attacks (e.g., Golden and Silver Tickets), and leveraging misconfigurations for domain dominance.
Content in this path
Active Directory
Active Directory from recon to privilege escalation!
Active Directory Exploitation Labs
Hands-on exploitation labs!


