This workshop focuses on a few Active Directory attack paths, from privilege escalation to domain dominance, and introduces various detection techniques using logs and open-source tools. We'll walk through the attacks from a Blue Team's view, trace the attack footprints, and go over some hardening techniques.