Professional Documents
Culture Documents
Active Directory Pentest Course
Active Directory Pentest Course
ACTIVE
DIRECTORY
Penetration Testing + Red Team Tactics
www.ignitetechnologies.in
ABOUT
Well-Known Entity for Offensive Security
ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out to be
a trusted brand in cyber security training and services
WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
ABOUT COURSE
Active Directory Domain Services (AD DS) manages directory data storage
passwords, and phone numbers, and allows other legitimate users on the
DURATION: 32 HOURS
Professionals who want to learn about the most common risks can
to identify them.
To wrap things up, you will learn how to conduct red team attacks on
In this course, you will learn How to Enforce Red Team Tactics to eliminate
AD Pentest lab.
THREATS TO
ACTIVE DIRECTORY SYSTEMS
1. Default Security Settings: Microsoft built a set of predetermined, default security
settings for AD. These security settings may not be suitable for the needs of your
organization. Furthermore, hackers are well-versed in these default security set-
tings and will attempt to attack gaps and vulnerabilities.
3. Inappropriate or Broad Access for Roles and Employees: Administrators can pro-
vide employees access to specific applications and data based on their positions.
Access levels are determined by the roles assigned to individuals. It is critical to re-
strict access to individuals and roles to the levels necessary for them to accomplish
their job tasks.
PREREQUISITES
The candidate should have a basic understanding of Active Directory and
Networking and also know the fundamental approach of system hacking.
AD INDEX
1 2
M1 Initial AD Exploitation M2 AD Post Enumeration
• Introduction to AD • RPCClient
• Lab Setup • Bloodhound
• Abusing SMB • PowerView
• SMB DLL Delivery
4
• LLMNR Poisoning Attack M4 Credential Dumping
• Capturing NTLMv2 Hashes • Domain Cache Credential
• LAPS
3 M3 Abusing Kerberos
• Kerberos Authentication & Delegation
• AS-REP Roasting
• DCSync Attack
• NTDS.dit
• Golden Ticket
• Kerberoasting Attack • Silver Ticket
• Kerberos Brute Force Attack
5
M5 Privilege Escalation
• Unconstrained Delegation R
6 M6 Persistence
• Golden Certificate Attack
• DSRM
• esource-Based Delegation
• AdminSDHolder
• HiveNightmare
• DC Shadow Attack
• sAMAccountName Spoofing
• Skeleton Key
• SeBackupPrivilege
• Token Impersonation
• PrintNightmare 8 M8 Bonus Section
• Powershell-Empire
• Crackmapexec
7 M7 Lateral Movement
• Pass the Ticket
• Pass the Cache
• Impacket
• A to Z MimiKatz & Rubeus
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
info@ignitetechnologies.in
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies