Attacking AD# This section contains notes on attacking Active Directory (AD) Initial Attack Vectors Starting Position and Goals Methodology Gaining Shell Access Enumeration Starting Position and Goals Methodology Post Compromise Attacks Starting Position and Goals Methodology Post Domain Compromise Attacks Starting Position and Goals Methodology