Authors to look into

  1. Will Schroeder (@harmj0y)
  2. Sean Metcalf (@PyroTek3)
  3. Benjamin Delpy (@gentilkiwi)
  4. Andy Robbins (@_wald0)
  5. Rohan Vazarkar (@CptJesus)
  6. Michael Grafnetter
  7. Dirk-jan Mollema (@_dirkjan)
  8. Lee Christensen (@tifkin_)
  9. Matthew Graeber (@mattifestation)
  10. Ryan Hausknecht (@haus3c)
  11. Joe Bialek (@JosephBialek)
  12. Elad Shamir (@elad_shamir)
  13. Marcello Salvati (@byt3bl33d3r)
  14. Nathan Kirby
  15. Timothy Medin (@TimMedin)
  16. Alva ‘Skip’ Duckwall (@passingthehash)
  17. Nabeel Ahmed (@nabeel_noman)
  18. Jean-Francois Maes (SANS workshop)
  19.  Alex Ionescu,
  20. Pavel Yosifovich,
  21. and Yarden Shafir

Websites to look into

  1. https://adsecurity.org/?page_id=2532
  2. https://harmj0y.medium.com/
  3. https://www.darkreading.com/author/andy-robbins
  4. https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse
  5. https://book.hacktricks.xyz/windows-hardening/active-directory-methodology
  6. https://github.com/geeksniper/active-directory-pentest
  7. https://adam-toscher.medium.com/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa
  8. https://medium.com/@Dmitriy_Area51/active-directory-penetration-testing-d9180bff24a1
  9. https://zer1t0.gitlab.io/posts/attacking_ad/
  10. https://www.hub.trimarcsecurity.com/posts/categories/active-directory
  11. https://posts.specterops.io/
  12. https://en.hackndo.com/
  13. https://dirkjanm.io/
  14. https://m365internals.com/2021/04/27/practical-compromise-recovery-guidance-for-active-directory/
  15. https://practical365.com/active-directory/
  16. https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#references

Mindmap

  1. https://mayfly277.github.io/posts/Upgrade-Active-Directory-mindmap-v2022_11/

LABS Local

  1. https://github.com/Orange-Cyberdefense/GOAD

During Pentesting

  1. https://wadcoms.github.io/

Exchange