In today’s advanced threat environment, Active Directory stands at the core of enterprise identity and access management, making it the most valuable target for determined adversaries. It controls authentication, authorization and trust relationships across users, servers, applications and hybrid cloud services. Compromising Active Directory does not result in limited access to a single host but enables control over the entire organizational environment. This centralization of identity and privilege makes AD a single point of strategic failure in modern networks.
Sophisticated attackers understand that dominance over Active Directory enables long term persistence, covert lateral movement and complete control over security enforcement mechanisms. With sufficient privileges, adversaries can manipulate authentication flows, disable logging, deploy malware at scale and maintain access even after incident response efforts. As a result, nearly every advanced intrusion campaign ultimately pivots toward Active Directory abuse as the final objective for enterprise compromise.
Attack #1: Kerberoasting
Kerberoasting targets Active Directory service accounts that are linked to a Service Principal Name (SPN). Any authenticated domain user can request a Kerberos service ticket for these accounts. The ticket contains an encrypted password hash that attackers can extract and crack offline without interacting with the domain again.
Tools
The Execution
Attackers request Ticket Granting Service (TGS) tickets, forcing RC4 encryption when it is still allowed. RC4 hashes are significantly faster to crack than AES. The captured tickets are then converted into formats supported by password cracking tools like Hashcat or John the Ripper.
Defense
Attack #2: AS-REP Roasting
AS-REP Roasting targets domain user accounts that have Kerberos preauthentication disabled. When pre-auth is not required, the Key Distribution Center responds to authentication requests without first verifying the user. This allows an attacker to obtain an AS-REP response that includes data encrypted using the user’s password hash.
Tools
The Execution
The attacker sends an AS-REQ for a target user without providing valid credentials. The KDC returns an AS-REP containing encrypted material derived from the user’s password. This hash is then cracked offline using brute-force attacks. The attack is stealthy because it does not require logging into the account or accessing a service.
Defense
Attack #3: DCSync Attack
A DCSync attack abuses Active Directory’s built-in replication mechanism. Instead of cracking passwords, the attacker pretends to be a Domain Controller and requests user credential data through the Directory Replication Service Remote Protocol. This can expose password hashes for any account, including the critical KRBTGT account used by Kerberos.
Tools
The Execution
The attacker must already control an account with elevated privileges such as Domain Admin or explicit directory replication permissions. Once executed, the DC treats the request as legitimate replication traffic and returns sensitive credential data without triggering standard authentication failures.
Defense
Attack #4: Golden, Silver and Diamond Ticket Attacks
These attacks abuse Kerberos ticket trust to achieve stealthy persistence in Active Directory. Once successful, attackers can impersonate users or services without needing valid credentials again.
Tools
Defense
Attack #5: Pass-the-Ticket (PtT)
Pass-the-Ticket avoids password cracking entirely by stealing an already issued Kerberos ticket from system memory. Once a valid ticket is obtained, the attacker can reuse it to authenticate as the victim user without knowing the password.
Tools
The Execution
When a high-privilege user such as a Domain Admin logs into a compromised workstation, their Ticket Granting Ticket is stored in LSASS memory. The attacker dumps this ticket and injects it into their own session, instantly inheriting the same administrative permissions.
Defense
Attack #6: NTLM Relay Attacks
NTLM Relay attacks abuse the fact that NTLM authentication does not bind credentials to a specific server. If SMB signing is disabled, an attacker can capture an NTLM authentication attempt and forward it to another system, effectively authenticating as the victim without knowing their password.
Tools
The Execution
The attacker positions themselves between systems on the network using spoofing techniques. When a victim authenticates, the NTLM challenge-response is captured and immediately relayed to a target server like a Domain Controller or file server. If the victim has administrative rights on the target, the attacker gains access instantly.
Defense
Conclusion
Ultimately, the common thread across all of these attack techniques is simple control over identity equals control over the enterprise. Whether through offline ticket cracking, replication abuse or forged Kerberos trust, attackers are not looking for noisy destruction but for quiet, durable dominance of Active Directory. Once that control is achieved, traditional security boundaries lose meaning and remediation becomes exponentially more complex.
Closing these attack paths requires disciplined identity hygiene, continuous monitoring and a security model that assumes Active Directory is always under threat. Organizations that harden Kerberos, reduce privilege sprawl and actively hunt for identity abuse can turn Active Directory from an attacker’s greatest advantage into a defended stronghold ending the intrusion before it becomes a domain-wide compromise.
Copyright @ 2026 SECNORA®