AD with AI 2026 Enumeration Series. Prologue: From Manual Recon to AI-Assisted Tradecraft.
Active Directory (AD) is still the crown jewel of most enterprise environments. Despite years of hardening, it remains one of the most targeted—and most misunderstood—attack surfaces in internal penetration testing. But in 2026, enumeration is no longer just about running tools like BloodHound and dumping LDAP data.
We’ve entered the era of AI-assisted offensive security — where automation doesn’t just collect data, it interprets, prioritizes, and guides our attack path. Literally new era of cybersecurity.
Here we’ll walk through a modern AD enumeration scenario and how red teamers are combining traditional techniques with AI-driven workflows.
Common Scenario: Initial Foothold in a Corporate Network
You’ve gained access via:
- Phishing (user-level access)
- VPN credentials
- Initial shell on a domain-joined workstation
Your objectives:
- Map the domain
- Identify privilege escalation paths
- Locate high-value targets (Domain Admins, servers, trust relationships)
- Stay stealthy
Phase I: Passive & Low-Noise Enumeration. Before touching anything noisy, modern operators start with context gathering.
Key Data Sources
- Environment variables
- Cached credentials
- Logged-in users
- Domain info via built-in commands
whoami /all
set
nltest /dsgetdc:<domain>
Living-off-the-Land Enumeration
Avoid dropping tools early. Use native binaries:
net user /domainnet group "Domain Admins" /domainnet config workstation
Phase II: LDAP & AD Graph Enumeration. This is where things used to get noisy. In 2026, it’s more controlled.
Traditional approach
- BloodHound (SharpHound collector)
- LDAP queries
- Kerberoasting scans
Up to date approach
Instead of dumping everything, operators now:
- Perform targeted LDAP queries
- Use adaptive collection strategies
- Feed results into AI-assisted analysis pipelines
Phase III: AI-Assisted Enumeration. Here’s where things change significantly.
How AI could help?
- Parsing massive AD datasets
- Highlighting attack paths
- Suggesting privilege escalation strategies
- Detecting misconfigurations faster than manual review
Example Workflow
-
Collect minimal AD data:
- Users
- Groups
- ACLs (selective)
- SPNs
-
Feed into an AI model (local or secured environment)
-
Ask:
- “Show shortest path to Domain Admin”
- “Find accounts vulnerable to Kerberoasting”
- “Identify shadow admin privileges”
Example Insight Output
Instead of manually digging through graphs, AI might return:
- User
svc_backuphas GenericAll overIT_Admins IT_Adminsis nested in Domain Admins- Password last set 3 years ago
- SPN present → Kerberoastable
Suggested attack path: Kerberoast → Crack → Privilege escalation → DA
Phase 4: Modern Enumeration Techniques
1. Kerberos Abuse Enumeration
- Identify SPNs
- AS-REP roasting candidates
- Delegation misconfigurations
2. ACL & Permission Analysis
- GenericAll / GenericWrite
- WriteDACL
- Resource-Based Constrained Delegation (RBCD)
3. Session & Lateral Movement Mapping
- Logged-on users
- Admin sessions
- Workstation relationships
Phase 5: Stealth & Evasion Considerations
Detection has improved significantly.
Modern defensive tools:
- UEBA systems
- EDR with behavioral analytics
- AD auditing enhancements
Red Team Adjustments
- Limit query volume
- Randomize enumeration timing
- Use “human-like” query patterns
- Prefer API/LDAP over noisy collectors
Phase 6: Automation Pipelines
In 2026, mature operators don’t run tools manually — they build pipelines.
Example Stack
- Data Collection: Lightweight LDAP scripts
- Processing: Python + graph analysis
- AI Layer: Local LLM / secure inference engine
- Output: Attack path prioritization
Example Python Concept:
data = collect_ldap(minimal=True)
analysis = ai_model.analyze(data, goals=[
"privilege_escalation",
"kerberoast_targets",
"lateral_movement"
])
print(analysis["top_attack_paths"])- AI enhances decision-making, not exploitation
- Stealth is now as important as coverage
From:
“Run BloodHound and click around”
To:
“Collect minimal data, let AI highlight the path, execute with precision”.
If you’re still doing full-domain dumps by default, you’re not just outdated — you’re noisy! And in 2026, noisy gets you caught.
What should We learn next If U want to go deeper?
DM ME...