Learning Paths
Skills
Active Directory Exploitation
4 courses
3 hours
The Active Directory Exploitation path covers attackers target, exploit, and abuse weaknesses in Active Directory (AD) environments to escalate privileges, gain unauthorized access, and move laterally within a network. This path explores techniques such as credential dumping, pass-the-hash, Kerberos ticket attacks (e.g., Golden and Silver Tickets), and leveraging misconfigurations for domain dominance.
Courses in this path
Active Directory
Active Directory from recon to privilege escalation!
Active Directory Exploitation Labs
Hands-on exploitation labs!