How Attackers Compromise Active Directory | AD Attacks Explained

Learn how attackers compromise Active Directory in real-world enterprise environments. This video explains AD attacks, authentication abuse, and pentesting t...

How Attackers Compromise Active Directory | AD Attacks Explained
whitesec cyber security
3.0K views β€’ Jan 8, 2026
How Attackers Compromise Active Directory | AD Attacks Explained

About this video

Learn how attackers compromise Active Directory in real-world enterprise environments.
This video explains AD attacks, authentication abuse, and pentesting techniques step by step.

πŸ‘‰ For best learning experience, watch this course in **1.5Γ— speed**

00:00:00 Introduction
00:02:35 What Is Active Directory and Why It Was Created
00:05:58 How Active Directory Works in Daily Office Life
00:07:08 The Role of the Domain Controller
00:07:49 Why Even Small Companies Use Active Directory
00:08:25 Why Security and Pentesting Are Necessary in AD
00:09:42 Active Directory Domain Services (AD DS)
00:11:32 Lightweight Directory Services (AD LDS)
00:12:43 Active Directory Certificate Services (AD CS)
00:14:10 Active Directory Federation Services (AD FS)
00:15:18 Active Directory Rights Management Services (AD RMS)
00:16:19 What Attackers Can Achieve by Compromising AD Services
00:17:39 Key Feature: Hierarchical Organizational Structure
00:18:55 Centralized Resource Management
00:19:53 Authentication and Authorization
00:20:56 Group Policy Objects (GPOs)
00:22:06 Replication and Fault Tolerance
00:22:52 Delegation of Administrative Control
00:23:23 Auditing and Logging
00:24:27 Scalability and Integration
00:24:58 Service Accounts and Security in Active Directory
00:26:28 Authentication Protocols in Active Directory
00:27:09 Kerberos Authentication Explained
00:29:20 NTLM Authentication Explained
00:30:30 Encryption in Active Directory
00:31:31 The Core Goal of Active Directory Attacks
00:33:39 Initial Access Vectors in Active Directory Attacks
00:34:53 LLMNR and NBT-NS Poisoning Explained
00:37:15 SMB Relay Attacks Explained
00:38:40 DNS Takeover Attacks
00:39:43 Kerberoasting Attacks Explained
00:41:32 Pass-the-Hash Attack Explained
00:44:16 Token Impersonation Attack Explained
00:46:03 Why Defenders Often Miss Active Directory Attacks
00:48:47 Practical Attacks Overview
00:48:50 Windows 10 and Windows Server Overview
00:53:12 Setting Up Windows Server
01:01:45 Setting Up Active Directory Domain Services
01:06:59 Setting Up Certificate Services (AD CS)
01:10:14 Creating Local Users and Service Accounts
01:21:53 Creating and Configuring Shared Folders
01:23:20 Creating Group Policy to Disable Windows Defender
01:27:05 IPv4 Network Configuration
01:29:33 Joining Windows 10 to Active Directory
01:39:00 Configuring Machines for Attacks
01:48:49 Setting Up the Client Machine
01:57:03 Setting Up the Kali Linux Machine
02:02:21 LLMNR Poisoning Practical Demonstration
02:09:42 SMB Relay Attack Practical Demonstration
02:20:20 Cracking NTLMv2 and Interacting Using PsExec
02:36:25 Pass-the-Hash Attack Practical
02:38:53 Penetration Testing and Red Team Training
02:55:22 Advanced Android Hacking for Ethical Hackers

join our Red team training -
Training curriculum - https://trainings.whitesec.org
contact us WhatsApp - https://wa.me/918019263448

advance android training -
training curriculum - https://trainings.whitesec.org/adv
contact us WhatsApp - https://wa.me/918019263448

Red Team Training Demo – https://t.me/whiteseconlinecybersecurityorg/892
Android hacking for Ethical hackers Training Demo - https://t.me/whiteseconlinecybersecurityorg/894
Udemy - https://www.udemy.com/user/whitesec-23/
telegram channel - https://t.me/whiteseconlinecybersecurityorg

whitesecross - Advanced XSS Scanner
https://github.com/whiteseccybersecurity/whitesecross

Disclaimer -
This video is made available for educational and informational purposes only.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. whitesec cybersecurity is not responsible for any misuse of the provided information.

active directory penetration testing
pentest active directory
penetration testing active directory
active directory pentesting tools
active directory pentesting tutorial
ad penetration testing
pentest domain controller
cyber red team
red blue team
redteaming

#ethicalhacking #cybersecurity #technology

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

3.0K

Likes

166

Duration

03:08:52

Published

Jan 8, 2026

User Reviews

4.5
(3)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.