In this module, you will be shown how to attack Active Directory environments. Specifically, you will be shown how to attack Windows authentication leveraging inefficiencies in its core (regardless of the basis being NTLM or Kerberos), how to bypass the latest in Windows security enhancements (Script block logging, AMSI, Constrained Language Mode, Applocker etc.) and how to identify and abuse common Active Directory misconfigurations. Then, you will be taught how to stealthily move laterally into a network leveraging native Windows functionality, how to abuse domain trusts and finally, how to stealthily own the whole infrastructure and persist on it. The whole range of Active Directory attacks and attacker TTPs are covered. From targeted kerberoasting to the infamous “printer bug” and from resource-based constrained delegation to abusing PAM trusts, attacking LAPS and abusing DPAPI as well as JEA. Three (3) fully featured and enterprise-like Active Directory environments will be provided to you where you will apply all the above and more while using the latest in C# and .NET tradecraft.