# Active Directory Pentesting Lab by Nee

I've been wanting to get into AD pentesting for the longest time. I've only had minimal AD pentest experience prior to setting this up. I'd probably have owned 1-2 domains at max😅 over @ [HackTheBox](https://www.hackthebox.com/).&#x20;

I've stayed with team penguin ever since RHCSA and I think its finally time to get myself familiarized with 🪟 , Active Directory and the various attack techniques that come with it!

I'm someone who believes that learning to build something is equally as important as knowing how to break it. I could've easily spun this environment up with [one](https://github.com/browninfosecguy/ADLab) of many scripts available over on github. But I decided to build this up from scratch to educate myself in regards to how a windows environment is setup!

Hope this setup guide helps someone out there! Do check out references and show them some support too :)&#x20;

![](https://1937192737-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FObuEPM0wMmlYGGoxYCbD%2Fuploads%2FAtS5E4Bm0WR9Uc4dLa8L%2FinfraWIDEa.jpg?alt=media\&token=9bbce266-1304-486d-8548-e29fab99a13f)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://ad.4pfsec.com/active-directory-pentesting-lab-by-nee.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
