# Active Directory Enumeration & Attacks

- [0. AD Pentest](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest.md)
- [Quick Guide To AD Pentesting](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest/quick-guide-to-ad-pentesting.md)
- [Active Directory: Full Attack Name](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest/active-directory-full-attack-name.md)
- [Active Directory Advanced Concepts](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest/active-directory-advanced-concepts.md)
- [Active Directory Delegation](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest/active-directory-delegation.md)
- [Beyond-Active-Directory](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/0.-ad-pentest/beyond-active-directory.md)
- [1.Initial Enumeration](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/1.initial-enumeration.md)
- [1.External Recon and Enumeration Principles](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/1.initial-enumeration/1.external-recon-and-enumeration-principles.md)
- [1.initial-enumeration-of-the-domain](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/1.initial-enumeration/2.initial-enumeration-of-the-domain.md)
- [Active-Directory-Basic-Command](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/1.initial-enumeration/active-directory-basic-command.md)
- [2.Sniffing out a Foothold](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/2.sniffing-out-a-foothold.md)
- [3. LLMNR-NBT-NS Poisoning - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/2.sniffing-out-a-foothold/3.-llmnr-nbt-ns-poisoning-from-linux.md)
- [4.LLMNR-NBT-NS Poisoning - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/2.sniffing-out-a-foothold/4.llmnr-nbt-ns-poisoning-from-windows.md)
- [3.Sighting In, Hunting For A User](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/3.sighting-in-hunting-for-a-user.md)
- [5.Password Spraying Overview](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/3.sighting-in-hunting-for-a-user/5.password-spraying-overview.md)
- [6.Enumerating & Retrieving Password Policies](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/3.sighting-in-hunting-for-a-user/6.enumerating-and-retrieving-password-policies.md)
- [7.Password Spraying - Making a Target User List](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/3.sighting-in-hunting-for-a-user/7.password-spraying-making-a-target-user-list.md)
- [4.Spray Responsibly](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/4.spray-responsibly.md)
- [8. Internal Password Spraying - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/4.spray-responsibly/8.-internal-password-spraying-from-linux.md)
- [9.Internal Password Spraying - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/4.spray-responsibly/9.internal-password-spraying-from-windows.md)
- [5.Deeper Down the Rabbit Hole](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/5.deeper-down-the-rabbit-hole.md)
- [10. Enumerating Security Controls](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/5.deeper-down-the-rabbit-hole/10.-enumerating-security-controls.md)
- [11. Credentialed Enumeration - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/5.deeper-down-the-rabbit-hole/11.-credentialed-enumeration-from-linux.md)
- [12.Credentialed Enumeration - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/5.deeper-down-the-rabbit-hole/12.credentialed-enumeration-from-windows.md)
- [13. Living Off the Land](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/5.deeper-down-the-rabbit-hole/13.-living-off-the-land.md)
- [6.Cooking with Fire](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/6.cooking-with-fire.md)
- [14.Kerberoasting - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/6.cooking-with-fire/14.kerberoasting-from-linux.md)
- [15. Kerberoasting - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/6.cooking-with-fire/15.-kerberoasting-from-windows.md)
- [Kerberoasting Attack Step by Step Guide](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/6.cooking-with-fire/kerberoasting-attack-step-by-step-guide.md)
- [Kerberoasting Attack Step by Step Guide](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/6.cooking-with-fire/kerberoasting-attack-steps-and-commands.md)
- [7.An ACE in the Hole](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/7.an-ace-in-the-hole.md)
- [16.Access Control List (ACL) Abuse Primer](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/7.an-ace-in-the-hole/16.access-control-list-acl-abuse-primer.md)
- [17. ACL Enumeration](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/7.an-ace-in-the-hole/17.-acl-enumeration.md)
- [18. ACL Abuse Tactics](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/7.an-ace-in-the-hole/18.-acl-abuse-tactics.md)
- [19. DCSync](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/7.an-ace-in-the-hole/19.-dcsync.md)
- [8.Stacking The Deck](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/8.stacking-the-deck.md)
- [20.Privileged Access](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/8.stacking-the-deck/20.privileged-access.md)
- [21.Kerberos Double Hop Problem](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/8.stacking-the-deck/21.kerberos-double-hop-problem.md)
- [22.Bleeding Edge Vulnerabilities](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/8.stacking-the-deck/22.bleeding-edge-vulnerabilities.md)
- [23.Miscellaneous Misconfigurations](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/8.stacking-the-deck/23.miscellaneous-misconfigurations.md)
- [9.Why So Trusting](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/9.why-so-trusting.md)
- [24.Domain Trusts Primer](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/9.why-so-trusting/24.domain-trusts-primer.md)
- [25.Attacking Domain Trusts - Child - Parent Trusts - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/9.why-so-trusting/25.attacking-domain-trusts-child-parent-trusts-from-windows.md)
- [26. Attacking Domain Trusts - Child - Parent Trusts - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/9.why-so-trusting/26.-attacking-domain-trusts-child-parent-trusts-from-linux.md)
- [10.Breaking Down Boundaries](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/10.breaking-down-boundaries.md)
- [27.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Windows](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/10.breaking-down-boundaries/27.attacking-domain-trusts-cross-forest-trust-abuse-from-windows.md)
- [28.Attacking Domain Trusts - Cross-Forest Trust Abuse - from Linux](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/10.breaking-down-boundaries/28.attacking-domain-trusts-cross-forest-trust-abuse-from-linux.md)
- [11.Defensive Considerations](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/11.defensive-considerations.md)
- [29.Hardening-active-directory](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/11.defensive-considerations/29.hardening-active-directory.md)
- [30.Additional AD Auditing Techniques](/notes/my-certifications/cpts/notes/active-directory-enumeration-and-attacks/11.defensive-considerations/30.additional-ad-auditing-techniques.md)
