Active Directory: Full Attack Name
1๏ธโฃ Initial Access ๐ช
These attacks focus on gaining initial entry into the network.
Phishing Attack โ Sending a malicious email to a user that executes malware or a payload.
Malicious Attachments / Macros โ Injecting macro-based payloads into Word/Excel files.
Credential Stuffing โ Attempting logins using leaked passwords.
Pass-the-Cookie Attack โ Hijacking a session by stealing web session cookies.
Pass-the-Ticket Attack โ Reusing an active Kerberos ticket.
Malicious USB / Rubber Ducky โ Infiltrating the network via physical access.
Exposed SMB Shares โ Stealing confidential files from public SMB shares.
VPN Credential Hijacking โ Capturing remote VPN login credentials.
Zero-Day Exploitation โ Exploiting unpatched vulnerabilities (e.g., Log4Shell).
LLMNR/NBT-NS Poisoning โ Stealing credentials by intercepting name resolution queries.
Evil Twin Attack โ Capturing credentials from a fake Wi-Fi access point.
Watering Hole Attack โ Targeting users by placing malware on trusted websites.
Supply Chain Attack โ Infiltrating via third-party software or services.
2๏ธโฃ Credential Dumping Attacks ๐
These attacks aim to extract credentials from systems or memory.
Mimikatz Attack โ Extracting plain text passwords and hashes from LSASS memory.
DCSync Attack โ Obtaining NTLM hashes directly from a domain controller.
LSASS Dumping โ Extracting passwords by dumping the LSASS process.
SAM & SYSTEM Hive Dumping โ Obtaining local password hashes.
Kerberos Ticket Extraction โ Capturing active Kerberos tickets (TGT/TGS).
NTDS.dit Dumping โ Extracting all user credentials from the domain controller database.
WDigest Credential Theft โ Obtaining plain text passwords from Windows memory.
LSASS Memory Injection โ Stealing credentials by injecting malicious code into LSASS.
Cached Credentials Dumping โ Extracting and cracking stored mscache credentials.
Browser Credential Theft โ Stealing passwords and cookies stored in browsers.
DPAPI Attack โ Decrypting encrypted data by abusing the Data Protection API.
3๏ธโฃ Privilege Escalation Attacks ๐
These attacks escalate privileges to gain higher access levels.
Kerberoasting โ Extracting user passwords by cracking Kerberos service ticket hashes.
AS-REP Roasting โ Brute-forcing Kerberos AS-REP responses.
Token Impersonation Attack โ Stealing the security token of a high-privilege user.
Pass-the-Hash Attack โ Bypassing authentication with NTLM hashes.
Print Spooler Exploit โ Gaining SYSTEM access from the Print Spooler service.
Unconstrained Delegation Abuse โ Stealing NTLM hashes of unconstrained delegation users.
Constrained Delegation Abuse โ Abusing the Kerberos delegation feature.
Local Privilege Escalation โ Gaining admin privileges from system vulnerabilities (CVEs).
SeBackupPrivilege Abuse โ Abusing privileges to copy sensitive files.
SeRestorePrivilege Abuse โ Abusing privileges to modify registry or files.
Kerberos S4U2Self Abuse โ Abusing the S4U2Self protocol to create tickets.
Kerberos S4U2Proxy Abuse โ Abusing S4U2Proxy for unauthorized access.
DNSAdmins Group Abuse โ Having DNSAdmins members load malicious DLLs.
AD Certificate Services Attack โ Abusing AD Certificate Services to issue unauthorized certificates.
4๏ธโฃ Lateral Movement โ๏ธ
These attacks help spread within the network after initial access.
Pass-the-Hash โ Lateral movement from a compromised machine to another.
Pass-the-Ticket โ Accessing machines by reusing Kerberos TGTs.
SMB Relay Attack โ Exploiting SMB and LDAP services by relaying NTLM.
PSExec Attack โ Executing commands with SYSTEM access on remote machines.
RDP Hijacking โ Hijacking active RDP sessions without credentials.
WMI Lateral Movement โ Remote system control via Windows Management Instrumentation.
BloodHound Enumeration โ Finding high-privilege users and attack paths in AD.
DCOM Lateral Movement โ Remote code execution via DCOM.
WinRM Lateral Movement โ Running remote commands via Windows Remote Management.
Printer Bug โ Lateral movement via printer service vulnerabilities.
PetitPotam โ Compromising domain controllers with NTLM relay attacks.
Domain Trust Attacks โ Abusing inter-domain trust relationships.
Forest Trust Attacks โ Exploiting inter-forest trust relationships.
5๏ธโฃ Persistence & Domain Takeover ๐
These attacks ensure long-term access or full control of the domain.
Golden Ticket Attack โ Domain takeover by creating unlimited Kerberos TGTs.
Silver Ticket Attack โ Gaining access by creating Kerberos TGS for specific services.
Skeleton Key Attack โ Injecting a universal password on domain controllers.
AdminSDHolder Abuse โ Modifying permissions of protected accounts.
GPO Hijacking โ Deploying malicious Group Policy Objects.
SID History Injection โ Escalating privileges by creating fake SID history.
Shadow Credentials Attack โ Gaining unauthorized access by abusing Key Trust authentication.
RBCD Attack โ Exploiting AD's delegation mechanisms.
DCShadow Attack โ Making arbitrary changes by abusing domain controller replication rights.
WMI Event Subscription โ Setting up persistent backdoors with WMI events.
Registry Run Keys โ Running malicious programs at startup by modifying the registry.
AD Recycle Bin Exploitation โ Restoring deleted objects for backdoor access.
AD FS Token Forgery โ Creating fake tokens by stealing ADFS token signing certificates.
Azure AD Connect Exploitation โ Accessing hybrid environments by compromising sync accounts.
6๏ธโฃ NTLM & Kerberos Exploitation ๐
These attacks target NTLM and Kerberos authentication protocols.
NTLM Relay Attack โ Gaining unauthorized access by relaying NTLM authentication requests.
NTLMv1 Downgrade Attack โ Brute-forcing by downgrading NTLM authentication.
Kerberos Downgrade Attack โ Downgrading Kerberos to weaker encryption modes.
Kerberos Overpass-the-Hash โ Bypassing authentication without Kerberos tickets.
Brute-Force Kerberos Pre-Auth โ Attacking pre-auth disabled users.
PAC Tampering Attack โ Modifying Kerberos PAC.
TGT Delegation Abuse โ Using Kerberos delegation to use another user's ticket.
Kerberos Bronze Bit Attack โ Bypassing PAC validation for unauthorized access.
LDAP Relay Attack โ Gaining unauthorized access by relaying LDAP authentication requests.
7๏ธโฃ Data Exfiltration & Domain Persistence ๐ผ
These attacks focus on data theft or maintaining access.
LdapDomainDump Attack โ Extracting sensitive information from LDAP enumeration.
Group Policy Preference Exploit โ Dumping stored credentials from GPP XML files.
LSA Secrets Dumping โ Extracting Local Security Authority secrets.
SYSVOL Credential Theft โ Recovering plain text credentials from SYSVOL shares.
MSSQL Server Exploitation โ Privilege escalation from AD integrated MSSQL databases.
VSS Shadow Copy Exploit โ Extracting passwords and sensitive data from Windows VSS.
Cloud Sync Attack โ Exploiting the sync process of hybrid AD and Azure AD.
ADFS Token Signing Certificate Theft โ Stealing ADFS server certificates to create fake tokens.
Azure AD Attacks โ Exploiting Azure AD misconfigurations or weak permissions.
8๏ธโฃ Miscellaneous AD Attacks ๐ ๏ธ
These are additional techniques that don't fit into other categories.
AD Reconnaissance with PowerView โ Detailed enumeration of the AD environment with PowerView.
AD Object Permission Abuse โ Abusing excessive permissions for unauthorized changes.
Kerberos Unconstrained Delegation Abuse โ Capturing TGTs from unconstrained delegation.
Last updated