TrendingTopic

Active Directory attack tradecraft and guides

March 27, 2026Praetorian, Hacking Articles, spencer

Praetorian and Hacking Articles push AD exploitation content, spanning domain compromise paths and common techniques like Golden Ticket, Shadow Credentials, and Evil-WinRM usage.

Any domain user → SYSTEM → DC TGT → domain compromise. No admin needed.
Active Directory Pentesting with BloodyAD
Shadow Credentials Attack
Domain Persistence: Golden Ticket Attack
Evil-WinRM Penetration Testing Guide
proper AD tiering and least privilege
BridgeHead - Native C++ access to Active Directory over ADWS
Impacket DACLedit: Active Directory Privilege Escalation
ConditionalPolReviewer. PowerShell-based tool for auditing Microsoft Entra ID
generating a quick mock AdminService HTTP service for testing changes
Praetorian
Hacking Articles
spencer
Panos Gkatziroulis
DirectoryRanger
Adam Chester
active-directoryredteam

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security