Loading Events
White Knight Labs Training Bundle

Offensive Active Directory Operations Certification (OADOC)

Course Authored by:

White Knight Labs

Date / Time:

May 11 @ 9:00 am - May 13 @ 8:59 pm

Description

The Offensive Active Directory Operations Certification (OADOC) equips students with a comprehensive, hands-on understanding of how to identify and exploit modern Active Directory misconfigurations across both Windows and Linux environments. Designed for today’s mixed and evolving enterprise ecosystems, the course covers forest functional levels from Windows Server 2016 through Server 2025, ensuring every technique you learn is relevant, current, and applicable across real-world infrastructures. You’ll develop the ability to execute multi-platform attacks, leverage cutting-edge AD abuse strategies, and customize modern, signed, and stealthy tooling for enumeration and exploitation.

The training also dives deep into bypassing today’s most common defensive mechanisms, including LDAP obfuscation, channel binding and signing protections, and SMB-based controls, while reinforcing strong operational security practices. Throughout the course, you’ll learn to enumerate and exploit enterprise systems such as Kerberos-integrated SSH, SCCM, and MSSQL using both established and novel attack techniques. OADOC delivers not only technical skill but also the instructor team’s real-world tradecraft, operational insights, and guidance on clearly communicating attack paths and realistic remediation strategies to clients and stakeholders.

Key Learning Objectives

  • Multi-Platform Attacks – Execute cross-platform AD exploitation with techniques applicable to both Windows and Linux.
  • Cutting-Edge AD Abuses – Explore exploitation strategies across various modern forest functional levels, ensuring your tradecraft stays ahead of modern defenses.
  • Advanced AD Toolcraft – Leverage and customize modern, signed, and stealthy tools for effective AD enumeration and exploitation.
  • Bypass Strategies – Master LDAP obfuscation, channel binding and signing bypasses, SMB evasion, and other modern AD defense evasion tactics.
  • Operational Security & Defense Considerations – Bypass EDR/AV and network identity profiling, while understanding blue team detection strategies.
  • Learn how to enumerate and exploit enterprise software systems such as Kerberos-integrated SSH, SCCM and MSSQL with niche and novel attack techniques.
  • Benefit from the instructor team’s accrued knowledge of real-world successful TTPs, and learn from their opsec tips, as well as being able to communicate clearly with clients on attack paths and realistic remediation steps.

Prerequisite Knowledge

To ensure participants are prepared for the OADOC On-Demand, students must meet the following prerequisites:

  • Active Directory Fundamentals – Basic understanding of Active Directory structure, authentication, and common misconfigurations.
  • Networking Basics – Familiarity with network protocols, Windows domains, and authentication mechanisms.
  • Programming Experience – Some experience with scripting (PowerShell, Python) or compiled languages (C, C++) for AD exploitation.
  • Windows Internals – Understanding of Windows security mechanisms, process interactions, and privilege escalation techniques.
  • Offensive Security Mindset – Willingness to engage with challenging labs, stealth techniques, and real-world attack methodologies.

Who Should Attend?

  • Penetration Testers and Red Teamers: Looking to break into or advance their skillset in Active Directory exploitation and red teaming.
  • Blue Teamers and Defensive Security Professionals: Seeking to understand hyper-current attack techniques and enhance their detection capabilities.
  • Cybersecurity Professionals and Researchers: Aiming to explore cutting-edge Active Directory offensive security and modern bypass strategies.

Hardware Requirements

Participants must have an AWS account for lab deployment.

Contact

Services & Company Inquiries:

Student Support (Billing, Labs, Content, Vouchers, Tickets):

Copyright © 2026 White Knight Labs – All rights reserved