Active Directory: Full Attack Name

1๏ธโƒฃ Initial Access ๐Ÿšช

These attacks focus on gaining initial entry into the network.

  1. Phishing Attack โ€“ Sending a malicious email to a user that executes malware or a payload.

  2. Malicious Attachments / Macros โ€“ Injecting macro-based payloads into Word/Excel files.

  3. Credential Stuffing โ€“ Attempting logins using leaked passwords.

  4. Pass-the-Cookie Attack โ€“ Hijacking a session by stealing web session cookies.

  5. Pass-the-Ticket Attack โ€“ Reusing an active Kerberos ticket.

  6. Malicious USB / Rubber Ducky โ€“ Infiltrating the network via physical access.

  7. Exposed SMB Shares โ€“ Stealing confidential files from public SMB shares.

  8. VPN Credential Hijacking โ€“ Capturing remote VPN login credentials.

  9. Zero-Day Exploitation โ€“ Exploiting unpatched vulnerabilities (e.g., Log4Shell).

  10. LLMNR/NBT-NS Poisoning โ€“ Stealing credentials by intercepting name resolution queries.

  11. Evil Twin Attack โ€“ Capturing credentials from a fake Wi-Fi access point.

  12. Watering Hole Attack โ€“ Targeting users by placing malware on trusted websites.

  13. Supply Chain Attack โ€“ Infiltrating via third-party software or services.


2๏ธโƒฃ Credential Dumping Attacks ๐Ÿ”‘

These attacks aim to extract credentials from systems or memory.

  1. Mimikatz Attack โ€“ Extracting plain text passwords and hashes from LSASS memory.

  2. DCSync Attack โ€“ Obtaining NTLM hashes directly from a domain controller.

  3. LSASS Dumping โ€“ Extracting passwords by dumping the LSASS process.

  4. SAM & SYSTEM Hive Dumping โ€“ Obtaining local password hashes.

  5. Kerberos Ticket Extraction โ€“ Capturing active Kerberos tickets (TGT/TGS).

  6. NTDS.dit Dumping โ€“ Extracting all user credentials from the domain controller database.

  7. WDigest Credential Theft โ€“ Obtaining plain text passwords from Windows memory.

  8. LSASS Memory Injection โ€“ Stealing credentials by injecting malicious code into LSASS.

  9. Cached Credentials Dumping โ€“ Extracting and cracking stored mscache credentials.

  10. Browser Credential Theft โ€“ Stealing passwords and cookies stored in browsers.

  11. DPAPI Attack โ€“ Decrypting encrypted data by abusing the Data Protection API.


3๏ธโƒฃ Privilege Escalation Attacks ๐Ÿš€

These attacks escalate privileges to gain higher access levels.

  1. Kerberoasting โ€“ Extracting user passwords by cracking Kerberos service ticket hashes.

  2. AS-REP Roasting โ€“ Brute-forcing Kerberos AS-REP responses.

  3. Token Impersonation Attack โ€“ Stealing the security token of a high-privilege user.

  4. Pass-the-Hash Attack โ€“ Bypassing authentication with NTLM hashes.

  5. Print Spooler Exploit โ€“ Gaining SYSTEM access from the Print Spooler service.

  6. Unconstrained Delegation Abuse โ€“ Stealing NTLM hashes of unconstrained delegation users.

  7. Constrained Delegation Abuse โ€“ Abusing the Kerberos delegation feature.

  8. Local Privilege Escalation โ€“ Gaining admin privileges from system vulnerabilities (CVEs).

  9. SeBackupPrivilege Abuse โ€“ Abusing privileges to copy sensitive files.

  10. SeRestorePrivilege Abuse โ€“ Abusing privileges to modify registry or files.

  11. Kerberos S4U2Self Abuse โ€“ Abusing the S4U2Self protocol to create tickets.

  12. Kerberos S4U2Proxy Abuse โ€“ Abusing S4U2Proxy for unauthorized access.

  13. DNSAdmins Group Abuse โ€“ Having DNSAdmins members load malicious DLLs.

  14. AD Certificate Services Attack โ€“ Abusing AD Certificate Services to issue unauthorized certificates.


4๏ธโƒฃ Lateral Movement โ†”๏ธ

These attacks help spread within the network after initial access.

  1. Pass-the-Hash โ€“ Lateral movement from a compromised machine to another.

  2. Pass-the-Ticket โ€“ Accessing machines by reusing Kerberos TGTs.

  3. SMB Relay Attack โ€“ Exploiting SMB and LDAP services by relaying NTLM.

  4. PSExec Attack โ€“ Executing commands with SYSTEM access on remote machines.

  5. RDP Hijacking โ€“ Hijacking active RDP sessions without credentials.

  6. WMI Lateral Movement โ€“ Remote system control via Windows Management Instrumentation.

  7. BloodHound Enumeration โ€“ Finding high-privilege users and attack paths in AD.

  8. DCOM Lateral Movement โ€“ Remote code execution via DCOM.

  9. WinRM Lateral Movement โ€“ Running remote commands via Windows Remote Management.

  10. Printer Bug โ€“ Lateral movement via printer service vulnerabilities.

  11. PetitPotam โ€“ Compromising domain controllers with NTLM relay attacks.

  12. Domain Trust Attacks โ€“ Abusing inter-domain trust relationships.

  13. Forest Trust Attacks โ€“ Exploiting inter-forest trust relationships.


5๏ธโƒฃ Persistence & Domain Takeover ๐Ÿ”’

These attacks ensure long-term access or full control of the domain.

  1. Golden Ticket Attack โ€“ Domain takeover by creating unlimited Kerberos TGTs.

  2. Silver Ticket Attack โ€“ Gaining access by creating Kerberos TGS for specific services.

  3. Skeleton Key Attack โ€“ Injecting a universal password on domain controllers.

  4. AdminSDHolder Abuse โ€“ Modifying permissions of protected accounts.

  5. GPO Hijacking โ€“ Deploying malicious Group Policy Objects.

  6. SID History Injection โ€“ Escalating privileges by creating fake SID history.

  7. Shadow Credentials Attack โ€“ Gaining unauthorized access by abusing Key Trust authentication.

  8. RBCD Attack โ€“ Exploiting AD's delegation mechanisms.

  9. DCShadow Attack โ€“ Making arbitrary changes by abusing domain controller replication rights.

  10. WMI Event Subscription โ€“ Setting up persistent backdoors with WMI events.

  11. Registry Run Keys โ€“ Running malicious programs at startup by modifying the registry.

  12. AD Recycle Bin Exploitation โ€“ Restoring deleted objects for backdoor access.

  13. AD FS Token Forgery โ€“ Creating fake tokens by stealing ADFS token signing certificates.

  14. Azure AD Connect Exploitation โ€“ Accessing hybrid environments by compromising sync accounts.


6๏ธโƒฃ NTLM & Kerberos Exploitation ๐Ÿ”

These attacks target NTLM and Kerberos authentication protocols.

  1. NTLM Relay Attack โ€“ Gaining unauthorized access by relaying NTLM authentication requests.

  2. NTLMv1 Downgrade Attack โ€“ Brute-forcing by downgrading NTLM authentication.

  3. Kerberos Downgrade Attack โ€“ Downgrading Kerberos to weaker encryption modes.

  4. Kerberos Overpass-the-Hash โ€“ Bypassing authentication without Kerberos tickets.

  5. Brute-Force Kerberos Pre-Auth โ€“ Attacking pre-auth disabled users.

  6. PAC Tampering Attack โ€“ Modifying Kerberos PAC.

  7. TGT Delegation Abuse โ€“ Using Kerberos delegation to use another user's ticket.

  8. Kerberos Bronze Bit Attack โ€“ Bypassing PAC validation for unauthorized access.

  9. LDAP Relay Attack โ€“ Gaining unauthorized access by relaying LDAP authentication requests.


7๏ธโƒฃ Data Exfiltration & Domain Persistence ๐Ÿ’ผ

These attacks focus on data theft or maintaining access.

  1. LdapDomainDump Attack โ€“ Extracting sensitive information from LDAP enumeration.

  2. Group Policy Preference Exploit โ€“ Dumping stored credentials from GPP XML files.

  3. LSA Secrets Dumping โ€“ Extracting Local Security Authority secrets.

  4. SYSVOL Credential Theft โ€“ Recovering plain text credentials from SYSVOL shares.

  5. MSSQL Server Exploitation โ€“ Privilege escalation from AD integrated MSSQL databases.

  6. VSS Shadow Copy Exploit โ€“ Extracting passwords and sensitive data from Windows VSS.

  7. Cloud Sync Attack โ€“ Exploiting the sync process of hybrid AD and Azure AD.

  8. ADFS Token Signing Certificate Theft โ€“ Stealing ADFS server certificates to create fake tokens.

  9. Azure AD Attacks โ€“ Exploiting Azure AD misconfigurations or weak permissions.


8๏ธโƒฃ Miscellaneous AD Attacks ๐Ÿ› ๏ธ

These are additional techniques that don't fit into other categories.

  1. AD Reconnaissance with PowerView โ€“ Detailed enumeration of the AD environment with PowerView.

  2. AD Object Permission Abuse โ€“ Abusing excessive permissions for unauthorized changes.

  3. Kerberos Unconstrained Delegation Abuse โ€“ Capturing TGTs from unconstrained delegation.

Last updated