4
0
Support the library.
Your support helps keep books free for everyone ❤️
📍 Noticed
Active Directory Enumeration: Tools and Techniques for Recon and Mapping (Active Directory Exploited: The Complete Ethical Hacker’s Collection Book 2)
by Mikhailen Vostorov
Sponsored
Synopsis
They say knowledge is power—but in Active Directory, knowledge is recon.
Welcome to Active Directory Enumeration: Tools and Techniques for Recon and Mapping, the second book in my Active Directory Exploited: The Complete Ethical Hacker’s Collection—a full-spectrum journey through the art (and ...
Welcome to Active Directory Enumeration: Tools and Techniques for Recon and Mapping, the second book in my Active Directory Exploited: The Complete Ethical Hacker’s Collection—a full-spectrum journey through the art (and ...
They say knowledge is power—but in Active Directory, knowledge is recon.
Welcome to Active Directory Enumeration: Tools and Techniques for Recon and Mapping, the second book in my Active Directory Exploited: The Complete Ethical Hacker’s Collection—a full-spectrum journey through the art (and mischief) of ethical hacking inside enterprise identity systems.
What You’ll Learn
In Active Directory Enumeration: Tools and Techniques for Recon and Mapping, you’ll move from recon novice to directory detective. Each chapter is packed with practical examples, hands-on techniques, and real-world lessons learned from years of ethical hacking engagements.
Here’s a sneak peek at what’s inside:
Chapter 1: Enumeration Fundamentals & Recon Methodology – Learn how to think like a recon pro, craft a checklist, and survive your first engagement without breaking anything important.
Chapter 2: Environment Discovery – Scan networks, identify hosts, and spot domain controllers like a pro.
Chapter 3: LDAP & AD Querying – Speak fluent LDAP, master filters, and uncover hidden objects.
Chapter 4: Windows Tools – Rediscover built-in gems like net, nltest, and PowerShell’s Get-AD* cmdlets.
Chapter 5: PowerSploit & PowerView – Use PowerShell’s dark arts for safe, automated enumeration.
Chapter 6: BloodHound – Visualize relationships, attack paths, and privilege chains that connect the AD kingdom.
Chapter 7: DNS Discovery – Decode AD’s gossip network: SRV records, zones, and misconfigurations galore.
Chapter 8: SPNs & Kerberos – Find service accounts, spot Kerberoastable targets, and understand authentication at its finest.
Chapter 9: ACLs & Permissions – Read AD’s fine print: permissions, delegations, and abusable ACEs explained with a sense of humor.
Chapter 10: Group Policy Enumeration – Crawl through GPOs, discover risky settings, and appreciate the chaos of inheritance.
Chapter 11: Hybrid Enumeration – Connect the dots between on-prem and Azure AD for hybrid identity recon.
Chapter 12: Automation & Reporting – Turn messy recon data into clean, actionable intelligence that clients and defenders actually love.
Appendix: Practical Labs & Cheat Sheets – Build your own AD lab, practice ethically, and master your tools in a safe environment.
By the time you close the last page, you’ll know how to enumerate everything that matters in Active Directory—from users and permissions to domains, trusts, and service accounts—without leaving a trail of chaos behind.
Why This Book (and This Series) Matters
From there, we move into the thrilling and slightly dangerous territory of:
Active Directory Hacking: Initial Access Techniques for Ethical Hackers
Privilege Escalation in Active Directory
Lateral Movement in Active Directory
Persistence in Active Directory
Hacking Hybrid Environments
Active Directory Defense
Red Team Operations in Active Directory
Active Directory Hacking Lab Manua
Together, these books form the Active Directory Exploited collection—a complete, structured path from foundational learning to advanced attack simulation and defense. Whether you’re a student building your first lab, a red teamer honing your craft, or a blue teamer learning how attackers think, the series meets you exactly where you are.
You May Also Like
Vermont Country Store Cookbook: Recipes, History, and Lore from the Classic American General Store
Andrea Diehl
Lovely Deceit: A Dark College Romance (Pretty Little Dead Girl)
E. M. Moore
Accidentally Compromising the Duke (Wedded by Scandal, #1)
Stacy Reid
The Escape Game
Marissa Meyer
Aaron Slater, Illustrator (Questioneers Picture Books)
Andrea Beaty
Lonely Planet Egypt 13 (Travel Guide)
Jessica Lee
Non Fiction Picks
View All
Practicing the Way: Be with Jesus Become Like Him Do As He Did
John Mark Comer
The Making of the American Mind: The Story of our Declaration of Independence
Matthew Spalding
The Word for World: The Maps of Ursula K. Le Guin
Ursula K. Le Guin
Intersex: A Manifesto Against Medicalization
Iain Morland
Unreasonable Hospitality: The Remarkable Power of Giving People More Than They Expect
Will Guidara
Revenge of the Tipping Point: Overstories Superspreaders and the Rise of Social Engineering
Malcolm Gladwell