Enumerating Active Directory
Enumerating will allow you to gather sensitive information about all the objects, users, devices, and policies within the entire Active Directory domain. Such information will provide you with insights into how the organization uses Active Directory to manage its domain. You will also be able to gain a clear idea of how to exploit the trust between domain clients, users, and the domain controller to compromise an organization's Active Directory domain.
To recap, in Chapter 3, Setting Up for Advanced Hacking Techniques, you learned how to assemble our Red Team Lab, which will be highly utilized during this chapter to help you understand and exploit an Active Directory domain. The following diagram shows the topology that we'll be using throughout this chapter:
As shown in the preceding diagram, Kali Linux is the attacker machine that is connected to the Red Team Lab, which...