Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Purple AD – Active Directory Lab Environment

Uday Mittal July 8, 2020 3 Comments

Purple AD – Active Directory Lab Environment

Playing around with an Active Directory environment is fun. Whether we do it as sysadmin or security researcher, we need a lab environment to work with. The following video provides an overview of the AD lab I have built using my computer systems. I will be using this lab in further Purple AD posts to demonstrate various attack and defense techniques.

 

Related Posts

  • 5 Tips for Safe Digital Payments5 Tips for Safe Digital Payments
  • Secure Your Wifi Connection: Why & How?Secure Your Wifi Connection: Why & How?
mm
Uday Mittal

Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.

Filed Under: Lab Tagged With: Active directory lab, lab environment, lab hardware

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress