Introduction
UNDERSTANDING ACTIVE DIRECTORY AUTHENTICATION
PERFORMING ATTACKS ON ACTIVE DIRECTORY