📃
Internal Pentest
CtrlK
  • Internal pentest
    • Active Directory
      • Core Concepts
        • Domain Controllers
        • AD DS Data Store
        • AD DS Schema
        • Attributes
        • Containers and Leaves
        • Object Names and Identities
        • Directory Partitions/Naming Contexts
        • Oraganizational Units, Namespaces, domains, domain trees, forests and trust relationships
      • Reconnaissance
      • Initial attack vectors
        • LLMNR/NBT-NS Poisoning
          • Intercept and Hashcat
          • SMB relay
        • IPv6 Attacks
          • Basic attack
          • Combining NTLM Relaying and Kerberos delegation
          • Other attack vectors and strategies
        • ASREPRoast
        • ADCS + PetitPotal NTLM Relay
      • Post-Compromise Enumeration
        • Powerview
        • PingCastle
        • BloodHound
        • Other
      • Post-Compromise Attacks
        • Pass the Password
        • Pass the hash
        • Token impersonation
        • ASREPRoast
        • Kerberoasting
        • DCSync
        • DCShadow
        • GPP attacks
        • Golden tickets
        • PrintNightmare
        • Other Lateral movements and attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
      • Definitions and fundamentals
    • AWS
Powered by GitBook
On this page

Was this helpful?

  1. Internal pentest
  2. Active Directory
  3. Core Concepts

Domain Controllers

A domain controller is a server with the AD DS (Active Directory Domain Service) server role installed that has specifically been promotted to a domain controller

DC high representation

a DC :

  • Host a copy of the AD DS directory store

  • Provide authentication and authorization services

  • Replicate updates to other domain controllers in the domain and forest

  • allow administrative access to manage user accounts and network ressources

PreviousCore ConceptsNextAD DS Data Store

Last updated 5 years ago

Was this helpful?