The Complete Active Directory Security Handbook
Exploitation, Detection, and Mitigation Strategies
IntroductionActive DirectoryAttack Technique 1: Pass the Hash: Use of Alternate Authentication Material (T1550)Attack Technique 2: Pass the Ticket: Use of Alternate Authentication Material (T1550)Attack Technique 3: KerberoastingAttack Technique 4: Golden Ticket AttackAttack Technique 5: DCShadow AttackAttack Technique 6: AS-REP RoastingAttack Technique 7: LDAP Injection AttackAttack Technique 8: PetitPotam NTLM Relay Attack on a Active Directory Certificate Services (AD CS)Conclusion & References