# Domain Exploitation

Active Directory and Windows domain exploitation techniques organized by MITRE ATT\&CK tactics.

## Tactics Overview

This section contains techniques and commands for domain exploitation, organized by the MITRE ATT\&CK framework:

* [**Execution (TA0002)**](/security/hacking/domain-exploitation/execution.md) - Running malicious code
* [**Persistence (TA0003)**](/security/hacking/domain-exploitation/persistence.md) - Maintaining foothold
* [**Privilege Escalation (TA0004)**](/security/hacking/domain-exploitation/privilege-escalation.md) - Gaining higher-level permissions
* [**Defense Evasion (TA0005)**](/security/hacking/domain-exploitation/defense-evasion.md) - Avoiding detection
* [**Credential Access (TA0006)**](/security/hacking/domain-exploitation/credential-access.md) - Stealing credentials
* [**Discovery (TA0007)**](/security/hacking/domain-exploitation/discovery.md) - Enumerating the environment
* [**Lateral Movement (TA0008)**](/security/hacking/domain-exploitation/lateral-movement.md) - Moving through the network
* [**Command and Control (TA0011)**](/security/hacking/domain-exploitation/command-and-control.md) - Maintaining communications
* [**Impact (TA0040)**](/security/hacking/domain-exploitation/impact.md) - Manipulating or destroying systems

## Key Tools

* **PowerSploit/PowerView** - AD enumeration and exploitation
* **Impacket** - Python-based network protocols
* **BloodHound** - AD attack path analysis
* **NetExec** - Network execution and credential theft
* **Rubeus** - Kerberos abuse toolkit
* **DSInternals** - Active Directory security research


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://burmat.gitbook.io/security/hacking/domain-exploitation.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
