Attack Paths & Priorities

When attacking Active Directory, we will not rely on patchable exploits; instead, we will abuse AD components.

In almost all attacks, there will be Living-off-the-Land (LotL) techniques, using built-in management tools and Windows as attack platform.

Last updated

Was this helpful?