- Home
- Security Operations
- Cyber Range Training
- Vulnerable-AD
Vulnerable-AD
Create a vulnerable active directory for testing various Active Directory attacks.

Vulnerable-AD
Create a vulnerable active directory for testing various Active Directory attacks.
Vulnerable-AD Description
Create a vulnerable active directory that allows you to test most Active Directory attacks in a local lab. Main Features: - Randomize Attacks - Full Coverage of the mentioned attacks - Some attacks require a client workstation - Supported Attacks: Abusing ACLs/ACEs, Kerberoasting, AS-REP Roasting, Abuse DnsAdmins, Password in Object Description, User Objects With Default password (Changeme123!), Password Spraying, DCSync, Silver Ticket, Golden Ticket, Pass-the-Hash, Pass-the-Ticket, SMB Signing Disabled. Example: If you haven't installed Active Directory yet, you can try the provided script. If you already have Active Directory installed, just run the script.
Vulnerable-AD FAQ
Common questions about Vulnerable-AD including features, pricing, alternatives, and user reviews.
Vulnerable-AD is Create a vulnerable active directory for testing various Active Directory attacks.. It is a Security Operations solution designed to help security teams with Red Team, Security Testing, Penetration Testing.
FEATURED
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Weekly cybersecurity newsletter for security leaders and professionals