


- 2READ
- General Terminologies
- Kerberos Authentication Process
- LDAP
- MSRPC
- Hashing Protocols
- Built-in AD Groups
- User Rights Assignment (priviliges)
- User Rights Assignment
- GPO Order of Precedence
- Commands
- LDAP Filtering (user account control bit values: UAC values)
- OID match strings
- ACL (Access Control Lists) & ACEs
- ACE attack types