Skip to main content

💥 AD-Attack-Roadmap


🧠 What’s the Deal?​

Give us the lowdown — what is this attack and why should anyone care?

Explain the core idea behind the attack, where it fits in the kill chain, and what makes it dangerous or interesting.


what Do you get with different attacks​

AttackWhy/Gains
Kerberoastingyou get root access
Domain user credentialsKerberoasting

RoadMap​

Information CollectedAttack Performed
SMB shares enumeratedLateral movement via SMB
Domain user credentialsKerberoasting

🎯 What’s the Big Win?​

What’s the attacker trying to pull off here?

  • Gain unauthorized access
  • Extract sensitive data
  • Escalate privileges
  • Lateral movement across the network

🧰 Gear Up (Prereqs)​

Don’t go in empty-handed. What do you need beforehand?

  • Access to target or vulnerable endpoint
  • Specific app version or config
  • Recon data (subdomain, login page, etc.)
  • Tools (e.g., Burp, nmap, ffuf, etc.)

🚀 Launch Sequence (How-To)​

Here’s how the magic happens — step by step.

# Example flow:
1. Identify the injection point
2. Craft payload: ' OR '1'='1
3. Send request and observe results