Active Directory PenTesting Tools
Active Directory PenTesting Tools
Active Directory
PenTesting Tools
PAGE 1
BloodHound
BloodHound is a popular open-
source tool for mapping and
analyzing an Active Directory
environment. It helps identify attack
paths, privilege escalation
opportunities, and other security
issues.
PAGE 3
PowerShell
PowerShell, especially with the
PowerView module, is a powerful
tool for Active Directory penetration
testing. It allows you to interact with
AD and perform various
reconnaissance and exploitation
tasks.
@NoorMaryam16
PAGE 4
Impacket
Impacket is a collection of Python
classes for working with network
protocols. It can be used for various
Active Directory-related attacks,
such as pass-the-hash, pass-the-
ticket, and more. It is a powerful tool
that can be used to perform a wide
variety of penetration testing tasks.
@NoorMaryam16
PAGE 5
Mimikatz
Mimikatz is a well-known tool for
extracting plaintext passwords,
hashes, PINs, and Kerberos tickets
from memory. It is often used for
post-exploitation activities in Active
Directory environments.
@NoorMaryam16
PAGE 6
PowerView
PowerView is a PowerShell tool for
enumerating and attacking Active
Directory. It is a powerful tool that
can be used to perform a variety of
penetration testing tasks.
@NoorMaryam16
PAGE 7
SharpHound
SharpHound is part of the
BloodHound project and is used to
collect data from Active Directory
environments. It helps identify
security risks and vulnerabilities.
SharpHound is a tool for
enumerating Active Directory and
creating graphical representations
of possible attack paths.
@NoorMaryam16
PAGE 8
Rubeus
Rubeus is a tool for Kerberos ticket
extraction, injection, and
manipulation. It can be used for
various Kerberos-related attacks in
Active Directory environments.
PAGE 9
CrackMapExec (CME)
CrackMapExec is a post-exploitation
tool that can be used for a variety of
tasks related to Active Directory
penetration testing, including
enumeration, lateral movement, and
more.
@NoorMaryam16
PAGE 10
Empire
Empire is a post-exploitation
framework that can be used for
lateral movement and privilege
escalation in Active Directory
environments.
@NoorMaryam16
PAGE 11
LAPSTool
LAPSTool (LAPS - Local
Administrator Password Solution) is
used to audit and extract the LAPS
password of a target machine. It can
be helpful for privilege escalation.
@NoorMaryam16
PAGE 12
Grouper2
Grouper2 is a tool for identifying the
relationships between groups in
Active Directory. It can be helpful
for understanding access control
and potential privilege escalation
paths.
@NoorMaryam16
@NOORMARYAM16