HackPathHackPath
CoursesRoadmapPracticePricing
>_
HackPath

Hacking Windows & Active Directory: Pass-the-Hash, Mimikatz, and Pivoting

0%
Lessons
Understanding Active Directory
01Active Directory Structure — Domains, Forests, and Controllers
45 min
02AD Protocols: LDAP, Kerberos and SMB
50 min
03Setting Up the Windows Active Directory Lab
60 min
Active Directory Enumeration
04Active Directory Enumeration: enum4linux, ldapdomaindump, and CrackMapExec
55 min
05BloodHound and SharpHound: Mapping Attack Paths
55 min
Credential Attacks
06Pass-the-Hash: Reusing an NTLM Hash
50 min
07Kerberoasting: Attacking Service Accounts
50 min
08AS-REP Roasting: Attacking Accounts Without Pre-authentication
45 min
Lateral Movement
09Lateral Movement: PSExec and SMB
45 min
10Lateral Movement: WMI and WinRM
45 min
Windows Privilege Escalation
11Mimikatz: Extracting Credentials from LSASS
55 min
12Token Impersonation: Windows Privilege Escalation
45 min
Active Directory Persistence
13Golden Ticket: Ultimate Kerberos Persistence
55 min
14DCSync: Dumping All Domain Hashes
50 min

Lesson 01

Active Directory Structure — Domains, Forests, and Controllers

Understand Active Directory’s architecture — domains, forests, organizational units, objects, and domain controllers — before learning how to attack it effectively.

Hacking Windows & Active Directory: Pass-the-Hash, Mimikatz and Pivoting/Active Directory Structure — Domains, Forests, and Controllers

Why understand AD before attacking it

Active Directory is present in 95% of Fortune 500 companies. It is the central identity and access management system in enterprise Windows environments. Compromising AD means compromising the entire organization.

But to attack it effectively, you first need to understand what it is — its structure, its components, and how its objects interact with each other.

Active Directory is a centralized directory that manages users, computers, groups, and security policies in an enterprise Windows network.

Active Directory structure overview showing forest, domain, domain controller, and common objects like users, computers, groups, and GPOs.
Think in layers: forest → domain → domain controller → objects and policies.

The Domain — the basic unit

An Active Directory domain is a group of objects (users, computers, groups) that share a common database and a centralized security policy. Each domain has a unique DNS name, for example corp.local or acme.com.

Everything that happens in a domain is managed by a Domain Controller (DC).

Domain is the basic administrative unit of Active Directory.

Domain Controller is the server that hosts and manages the AD database.

Key components of Active Directory

The Domain Controller (DC)

This is the central server. It stores the AD database (NTDS.dit), authenticates users, applies Group Policy Objects (GPOs), and manages permissions. Compromising the DC = compromising the entire domain.

AD objects

Everything in AD is an object. The most important objects for an attacker:

Object typeDescriptionOffensive interest
UserHuman user accountPrimary target — credentials, access
ComputerDomain-joined machinePivot for lateral movement
GroupCollection of objects with shared permissions"Domain Admins" = full domain access
Service AccountAccount used by services/applicationsKerberoasting target — often poorly secured
GPOGroup Policy applied to objectsCan deploy malicious scripts if writable

Organizational Units (OUs)

OUs are containers that organize AD objects hierarchically. Example: OU=Computers,OU=Paris,DC=corp,DC=local. GPOs can be applied per OU.

The Forest

A forest is a set of domains that share a common AD schema and trust relationships. It is AD’s highest security boundary. Multiple domains in a forest can trust each other — which opens inter-domain attack paths.

The NTDS.dit database

NTDS.dit is the Active Directory database file stored on the DC at C:\Windows\NTDS\NTDS.dit. It contains:

  • All AD objects (users, computers, groups)
  • The password hashes of all domain users
  • The attributes of each object

This is the holy grail of an AD attack. Extracting NTDS.dit = retrieving the hashes of all users, including Domain Admins. This is exactly what DCSync does (lesson 14).

Privileged groups to know

These are the priority targets in an AD attack:

GroupPrivilege levelWhat it gives you
Domain AdminsMaximumAdmin on all machines in the domain
Enterprise AdminsMaximum (forest)Admin across the entire AD forest
Schema AdminsVery highCan modify the AD schema
Backup OperatorsHighCan read NTDS.dit — often overlooked
Account OperatorsHighCan create/modify accounts

Trust relationships (Trusts)

When two domains trust each other, users from one domain can access resources in the other. That’s useful in enterprises — and dangerous for security.

Trust typeDirectionRisk
One-way trustA → B (A trusts B)Compromising B enables access to A
Two-way trustA ↔ BCompromising one domain threatens the other
Forest trustBetween forestsCross-forest compromise is possible
Flashcards
Flashcard

What is a Domain Controller (DC)?

Flashcard

What does the NTDS.dit file contain?

Flashcard

Why are service accounts priority targets?

Flashcard

What is the difference between an AD domain and an AD forest?

Practical exercises

Exercise 1 — On your Windows lab (which you’ll configure in lesson 3), open “Active Directory Users and Computers” on the DC. Navigate through the OUs and identify the Domain Admins and Enterprise Admins groups. Who is a member?

Exercise 2 — Find where the NTDS.dit file is located on your lab DC. Try to copy it directly — what happens? Why does Windows prevent it?

Open questions

Question 1 — Why is DNS critical in Active Directory?

Next Lesson

Now that you understand AD structure, the next lesson covers the core protocols that make Active Directory work—LDAP, Kerberos, and SMB.

Next: AD Protocols: LDAP, Kerberos and SMB

Hands-on challenge

Practice what you learned — run it on your machine.

Do the challenge →

You're on a free lesson

Ready to go further?

Unlock all courses, exercises, real-world scenarios and flashcards — everything to build real skills.

Unlock full access →

No commitment · Cancel anytime

Sign in to track your progress.

Sign in to validate →

13 lessons locked in this course · 800+ students enrolled

$99/year — save 31% vs monthly

Unlock full access →