VAR_PenTesting

Pen Testing Active Directory Environments

Our free step-by-step Ebook will show you all the tools and tactics that hackers use to leverage AD in post-exploitation.

Have you ever pen tested your Active Directory environment?

Hackers have known for a long time that Active Directory is a very rich source of metadata that can be used to accelerate the post-exploitation process.

Want to learn all the tools and tactics that they use to leverage AD in post-exploitation?

We'll explain how crackmapexec, PowerView, and a little graph theory can be used to ferret out vulnerabilities in your Active Directory environments before hackers find them.

What's covered...
  • Crackmapexec and PowerView
  • Getting Stuff Done With PowerView
  • Chasing Power Users
  • Graph Fun
  • Admins and Graphs
  • The Final Case
And more!

Trusted By