# Domain Exploitation

Active Directory and Windows domain exploitation techniques organized by MITRE ATT\&CK tactics.

## Tactics Overview

This section contains techniques and commands for domain exploitation, organized by the MITRE ATT\&CK framework:

* [**Execution (TA0002)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/execution) - Running malicious code
* [**Persistence (TA0003)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/persistence) - Maintaining foothold
* [**Privilege Escalation (TA0004)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/privilege-escalation) - Gaining higher-level permissions
* [**Defense Evasion (TA0005)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/defense-evasion) - Avoiding detection
* [**Credential Access (TA0006)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/credential-access) - Stealing credentials
* [**Discovery (TA0007)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/discovery) - Enumerating the environment
* [**Lateral Movement (TA0008)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/lateral-movement) - Moving through the network
* [**Command and Control (TA0011)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/command-and-control) - Maintaining communications
* [**Impact (TA0040)**](https://burmat.gitbook.io/security/hacking/domain-exploitation/impact) - Manipulating or destroying systems

## Key Tools

* **PowerSploit/PowerView** - AD enumeration and exploitation
* **Impacket** - Python-based network protocols
* **BloodHound** - AD attack path analysis
* **NetExec** - Network execution and credential theft
* **Rubeus** - Kerberos abuse toolkit
* **DSInternals** - Active Directory security research
