I will try to review different aspects of Active Directory and those terms that every pentester should control in order to understand the attacks that can be performed in a Active Directory network. Disclaimer: This is done for educational purposes, and you should only apply the attacks described here to systems that you have permission for.