BloodHound, Kerberoasting, Pass-the-Ticket, DCSync and full domain takeover. From recon to Domain Admin.
Why this matters right now
Active Directory — the #1 target in corporate attacks
After the course you will be able to
Not abstract knowledge — concrete skills you can demonstrate in an interview
Real attacks in the course
Every lesson is built on real incidents — not made-up examples
SolarWinds 2020
An APT group used Golden Ticket to move through the AD infrastructure of 18,000 organizations including Microsoft, FireEye and US Treasury. The compromise lasted 9 months.
Ryuk Ransomware 2019
Ryuk operators compromised AD in an average of 5 hours after initial access. Kerberoasting → Lateral Movement → DCSync → DA → network encryption.
NotPetya 2017
The worm spread through AD via EternalBlue and Mimikatz, automatically taking over domains. $10B in damages, affecting Maersk, Merck, FedEx.
Course Program
4 modules · 18 lessons · from AD recon to Golden Ticket and Domain Dominance
Where this course leads
MC-05 — a required course for three top cybersecurity specializations
AD/Identity Security Expert
Specialize in Active Directory security: attacks, defense, auditing and monitoring of AD infrastructure.
Red Teamer
Conduct full AD takeover as part of Red Team operations, simulating APT groups.
Infrastructure Pentester
Test corporate networks and AD infrastructures, find paths to Domain Admin.
Who this course is for
Pentesters
You test corporate infrastructures and want to master the full AD takeover cycle
Red Teamers
You simulate APT attacks and want to master advanced Domain Dominance techniques
Blue Team / AD Admin
You want to understand AD attacks to properly configure defense and monitoring
Master AD Attacks
and become Domain Admin
today
18 lessons, BloodHound, Mimikatz and practice on a full AD lab environment.
Active Directory Attacks
Level: advanced

