Overview
Admin/User Types & AD Hierarchy
Attacks: NTLMv1 & NTLMv2
Paths
Initial Attack Vectors
Post-Compromise Enumeration
Post-Compromise Attacks
Domain Compromised, Now What?
Additional AD Attacks
Case Studies
Pivoting