Dragon Training Logo

AttackingActiveDirectory

This course is your hands-on guide to attacking Active Directory environments, tailored for beginners and red teamers. Using real-world techniques and tools like BloodHound, Mimikatz, and PowerView, each video focuses on one attack vector at a time — making complex AD exploitation techniques easy to understand and apply. Topics covered include: Kerberoasting and Kerberos ticket abuse DCSync attacks and domain replication abuse Golden Ticket creation for persistent access GPO enumeration for privilege escalation Manual BloodHound graph building to visualize attack paths Ideal for those learning ethical hacking, penetration testing, or preparing for red teaming certifications, this series will help you build a strong technical foundation in Active Directory security. Whether you're learning for a lab, a real-world engagement, or a certification, these videos give you practical, actionable insights into how AD attacks work in real environments.

> Initializing training sequence...

> Loading combat modules...

> Accessing power level database...

Course Chapters

Attack Active Directory Kerberos Explained

Attack Active Directory Kerberos Explained

DIFFICULTY

Dcsync Attack Explained

Dcsync Attack Explained

DIFFICULTY

Create Bloodhound Graph Manually

Create Bloodhound Graph Manually

DIFFICULTY

GPO Enumeration | Attacking GPO

GPO Enumeration | Attacking GPO

DIFFICULTY

Golden Ticket Explained

Golden Ticket Explained

DIFFICULTY

Attacking AD | Kerberoasting

Attacking AD | Kerberoasting

DIFFICULTY
SYSTEM.ONLINE

What you’ll learn

  • Attack Active Directory Kerberos Explained
  • Dcsync Attack Explained
  • Create Bloodhound Graph Manually
  • GPO Enumeration | Attacking GPO
  • Golden Ticket Explained
  • Attacking AD | Kerberoasting

TOP WARRIORS

Join our leaderboard and prove your skills in real labs.