Scenario 1: Multi‑Stage AD Takeover / Full Chain Analysis


1- Initial Foothold (Phishing → Payload → User Access)


2- Credential Harvesting & Pass‑the-Hash (PtH)


3- Lateral Movement via PsExec


4- Kerberoasting (Offline Service Account Password Recovery)