🖥Active Directory Lab: Enumeration and Exploitation 🔐

Learn about Active Directory penetration testing enumeration and exploitation using tools like Impacket, Kerbrute, and CrackMapExec. This post focuses on initial external enumeration and exploitation; from the perspective of having access to the AD network but have no account credentials and little information about the internal network. You will learn:

  • Target enumeration with Nmap, CME, Nbtscan
  • Username enumeration with Nmap and Kerbrute
  • Exploit misconfigurations with Windapsearch and…





Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Biggest Data Breaches of 2019 so far

Nym | Groundbreaking Privacy Infastracture Crypto project

Ukrainians Are Preparing to Shed Web Gain Access To

2 Minute Guide: How to keep safe in 2020

{UPDATE} Ghost Bike Stunts Hack Free Resources Generator

The Bouncer, The Stateless Web, Cookies(JSON WEB TOKEN)

{UPDATE} Blood Aerna Hack Free Resources Generator

How to Read Your Husband’s Deleted Text Messages?

How to Read Your Husband’s Deleted Text Messages?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Robert Scocca

Robert Scocca


More from Medium


My approach to CTF creation


Gaining access to a network with Office macros — Pentesting and red teaming