Attacking Active Directory – Post Compromise Attacks

  1. Passing the Hash / Passing the Password
  2. Dumping Hashes