Overview

Admin/User Types & AD Hierarchy

Attacks: NTLMv1 & NTLMv2

Paths

Initial Attack Vectors

Post-Compromise Enumeration

Post-Compromise Attacks

Domain Compromised, Now What?

Additional AD Attacks

Case Studies

Pivoting