# AD

### Recursos y enlaces de referencia:

* [Active Directory desde 0](https://zer1t0.gitlab.io/posts/attacking_ad/)
* [AD 101](https://owasp.org/www-pdf-archive/OWASP_FFM_41_OffensiveActiveDirectory_101_MichaelRitter.pdf)
* [Ataques Active Directory y Kerberos](https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse)
* [Ataques y Defensas de Active Directory](https://github.com/infosecn1nja/AD-Attack-Defense#discovery)
* [CheetSheet de Active Directory](https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet)
* Cheat sheet de comandos de AD: [https://wadcoms.github.io/](https://wadcoms.github.io/#+Exploitation)
* LOLBAS project: [https://lolbas-project.github.io/#](https://lolbas-project.github.io)
* <https://adsecurity.org>
* <https://viperone.gitbook.io/pentest-everything/everything/everything-active-directory/>
* <https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet>
* <https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet>h
* h[ttps://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/](https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/)
* s4vitar -<https://www.youtube.com/playlist?list=PLlb2ZjHtNkpg2Mc3mbkdYAhEoqnMGdl2Z>
* <https://github.com/infosecn1nja/AD-Attack-Defense>
* <https://github.com/jaredhaight/WindowsAttackAndDefenseLab>
* <https://github.com/outflanknl/Invoke-ADLabDeployer>
