Active Directory attacks:
Pass-the-Hash (PtH) Attack: Involves stealing hashed credentials from one system and using them to authenticate to another system.
Pass-the-Ticket (PtT) Attack: Similar to PtH, but instead of hashes, it involves stealing Kerberos tickets.
Golden Ticket Attack: Creation of a Kerberos ticket-granting ticket (TGT) with virtually unlimited access.
Silver Ticket Attack: Creation of a Kerberos ticket for a specific service without having to know the account's password.
Brute Force Attack: Attempting to gain access by systematically trying all possible combinations of passwords.
Password Spraying: Trying a small number of commonly used passwords against many accounts.
Credential Stuffing: Using previously leaked credentials to gain unauthorized access to accounts.
Kerberoasting: Exploiting weak service account passwords to extract Kerberos Ticket Granting Service (TGS) tickets.
DNS Poisoning: Manipulating DNS records to redirect traffic to malicious servers.
Domain Controller Compromise: Gaining unauthorized access to the domain controller, which is the central authority for Active Directory.
Domain Admin Privilege Escalation: Exploiting vulnerabilities or misconfigurations to elevate privileges to the domain administrator level, granting extensive control over the entire Active Directory domain.
Pass-the-Cache (PtC) Attack: Exploiting cached credentials on a compromised system to authenticate to other systems within the network.
Token Impersonation: Manipulating access tokens to impersonate another user or gain unauthorized access to resources.
Overpass the Hash (OtH) Attack: Similar to Pass-the-Hash, but involves extracting password hashes from memory or registry instead of from LSASS process.
Distributed Denial of Service (DDoS) Attack: Flooding Active Directory services with a high volume of requests to disrupt normal operations, causing service outages.
Group Policy Object (GPO) Manipulation: Unauthorized modification of GPOs to deploy malicious configurations or settings across the network.
Trust Relationship Exploitation: Exploiting trust relationships between domains or forests to gain unauthorized access or perform lateral movement.
DNS Tunneling: Using DNS requests and responses to establish covert communication channels or exfiltrate data from the network.
SMB Relay Attack: Exploiting insecure SMB connections to relay authentication attempts and gain unauthorized access to systems.
Pass-the-Certificate (PtC) Attack: Exploiting digital certificates to gain unauthorized access or privileges within the Active Directory environment.