-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

The Ultimate Kali Linux Book
By :

Understanding the security vulnerabilities that are related to the trust of systems and users within Active Directory can be scary; however, it’s very useful for aspiring penetration testers and red teamers who are seeking to improve their skillset in identifying security flaws in an Active Directory environment within their organization.
In this chapter, you will learn how to perform advanced Active Directory attacks that focus on abusing trust within Active Directory to gain access and control of devices on a network. You will learn how to perform lateral and vertical movement within the Windows domain, and how to gain domain dominance and persistence within Active Directory.
In this chapter, we will cover the following topics:
Let’s dive in!