Active-Directory-Exploitation-Cheat-Sheet
→ View on GitHubAI Summary: The Active Directory Exploitation Cheat Sheet serves as a comprehensive resource for cybersecurity professionals, detailing methodologies and commands for navigating the Active Directory environment. Its primary use case involves facilitating reconnaissance, privilege escalation, and lateral movement within a network through structured commands using Powershell and .Net. Notable features include a systematic approach to various stages of the exploitation process, including domain enumeration, persistence techniques, and monitoring account vulnerabilities.
README
Active Directory Cheat Sheet
This repository contains a general methodology in the Active Directory environment. It is offered with a selection of quick commands from the most efficient tools based on Powershell, C, .Net 3.5 and .Net 4.5.
General Process:
- Recon
- Domain Enum
- Local Privilege Escalation
- Local Account Stealing
- Monitor Potential Incoming Account
- Local Account Stealing
- Admin Recon
- Lateral Movement
- Remote Administration
- Domain Admin Privileges
- Cross Trust Attacks
- Persistance and Exfiltrate
Active Directory Kill Chain:

Cheat Sheet Tree:
:construction_worker: