← All talks

5 Attacker Techniques: Elevate Privileges in Active Directory #shorts

BSides Frankfurt0:31325 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Understand the 5 key post-exploitation techniques attackers use to elevate privileges in Active Directory. Knowing their pathways is crucial for defense. #ActiveDirectory #CyberSecurity #AttackVectors #Pentesting #InfoSec
Show transcript [en]

One of the things you can do in your organization is you can create a share in your organization. And let me explain why. It's really incredibly important for you to understand what are the top techniques an attacker is going to go through post exploitation. If you understand the pathways that an attacker is going to take, there's really only about five post exploitation techniques an attacker is going to go through to try to elevate their privileges inside of Active Directory. They're going to do these five things.