Active Directory Exploitation

In the previous chapter, we explored how to exploit an organization's networks. We went from networking fundamentals to discovering the latest attacking methodologies. This chapter is your next step to gaining more knowledge about securing another important technical system for every modern company, which is Active Directory. We will take you to another level of experience following a well-designed plan to obtain the required skills to defend another environment.

The following topics will be covered in this chapter:

  • Learning Active Directory and Kerberos concepts
  • An overview of various Active Directory attacks
  • Learning what defensive measures are effective and how they mitigate current attacks

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.