CISO2CISO.COM & CYBER SECURITY GROUP

Active Directory Kill Chain – Attack and defend active directory using modern post exploitation adversary tradecraft activity

Summary

This document was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active Directory Kill Chain Attack and Modern Post Exploitation Adversary Tradecraft Activity.

Table of Contents

Discovery

Privilege Escalation

Defense Evasion

Credential Dumping

Lateral Movement

Persistence

Defense & Detection

Leave a Reply

Your email address will not be published.