Blog
HADESS
Cyber Security Magic

Active Directory Security: Attack Paths and Hardening

Active Directory Security: Attack Paths and Hardening

Part of the Cybersecurity Skills Guide — This article is one deep-dive in our complete guide series.

By HADESS Team | February 28, 2026 | Updated: February 28, 2026 | 5 min read

Active Directory remains the backbone of enterprise identity management, and it is also one of the most targeted components in any network. Attackers know that compromising AD usually means game over for the entire domain. If you work in security and your org runs AD, you need to understand both the offensive techniques and the defensive controls.

Common Attack Vectors

Kerberoasting targets service accounts by requesting Kerberos service tickets (TGS) for SPNs, then cracking them offline. Any authenticated user can request these tickets, making detection the primary defense. Monitor for anomalous TGS requests, especially bulk requests from a single account.

AS-REP Roasting goes after accounts with Kerberos pre-authentication disabled. Attackers request authentication data for these accounts and crack it offline. Audit your environment for accounts with DONT_REQUIRE_PREAUTH set — there should be almost none.

Delegation Attacks exploit unconstrained, constrained, or resource-based constrained delegation. Unconstrained delegation is the worst offender: any service with it can impersonate any user who authenticates to it. Migrate to constrained delegation with protocol transition, and use the Protected Users group for privileged accounts.

GPO Abuse happens when attackers modify Group Policy Objects to push malicious configurations, scripts, or scheduled tasks across the domain. Restrict GPO modification rights and monitor changes to SYSVOL.

Hardening Practices

Start with tiering. Implement a tiered administration model where Tier 0 (domain controllers, AD admins) credentials never touch Tier 1 (servers) or Tier 2 (workstations) systems. Use Privileged Access Workstations (PAWs) for Tier 0 administration.

Enforce the Protected Users security group for all privileged accounts. This disables NTLM authentication, Kerberos delegation, and DES/RC4 encryption for those accounts.

Deploy LAPS (Local Administrator Password Solution) to randomize local admin passwords on every machine. This breaks lateral movement chains that rely on shared local admin credentials.

Enable Advanced Audit Policies rather than the legacy audit categories. At minimum, log account logon events, logon events, object access, and directory service changes. Forward these to your SIEM and build detection rules for Kerberoasting (Event ID 4769 with RC4 encryption), DCSync (4662 with replication rights), and Golden Ticket usage.

Run regular assessments with tools like BloodHound to map attack paths. If BloodHound can find a path from a standard user to Domain Admin, so can an attacker.

What to Learn Next

AD security sits at the intersection of identity, network, and endpoint security. You need to understand Kerberos internals, LDAP, and Windows authentication flows at a protocol level to be effective here.

Next Steps

  • Assess your current AD security knowledge with our skills assessment
  • Browse the skills library for related identity and network security topics
  • Plan your certifications with the certificate roadmap — look at CRTP and CRTO for AD-focused offensive certs
  • Use the coaching tool to build a study plan around AD hardening and attack detection

Related Guides in This Series

Take the Next Step

Browse 80+ skills on HADESS. Go to the browse 80+ skills on hadess on HADESS.

See your certification roadmap. Check out the see your certification roadmap.

Get started freeCreate your HADESS account and access all career tools.

Frequently Asked Questions

How long does it take to learn this skill?

Most practitioners build working proficiency in 4-8 weeks of dedicated study with hands-on practice. Mastery takes longer and comes primarily through on-the-job experience.

Do I need certifications for this skill?

Certifications validate your knowledge to employers but are not strictly required. Hands-on experience and portfolio projects often carry more weight in technical interviews. Check the certification roadmap for relevant options.

What career paths use this skill?

Explore the career path explorer to see which roles require this skill and how it fits into different cybersecurity specializations.

HADESS Team consists of cybersecurity practitioners, hiring managers, and career strategists who have collectively spent 50+ years in the field.

Leave a Reply

Your email address will not be published. Required fields are marked *