https://www.hackthebox.com/blog/introduction-to-active-directory
https://pentestlab.blog/category/red-team/
https://redteamlabs.in/active-directory-penetration-testing/
https://www.hackingarticles.in/red-teaming/
https://h4ms1k.github.io/Red_Team_Active_Directory/#
https://notes.benheater.com/books/active-directory
https://zer1t0.gitlab.io/posts/attacking_ad/
https://blog.harmj0y.net/category/activedirectory/
https://0xsp.com/offensive/active-directory-attack-defense/
https://book.hacktricks.xyz/windows-hardening/active-directory-methodology
https://0x1.gitlab.io/pentesting/Active-Directory-Kill-Chain-Attack-and-Defense/
https://dmcxblue.gitbook.io/red-team-notes-2-0/active-directory/active-directory
https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/
https://heartburn.dev/kerberos-fundamentals/
https://www.hackingarticles.in/deep-dive-into-kerberoasting-attack/
https://book.hacktricks.xyz/windows/active-directory-methodology/kerberoast
https://medium.com/r3d-buck3t/attacking-service-accounts-with-kerberoasting-with-spns-de9894ca243f
https://www.slideshare.net/harmj0y/derbycon-2019-kerberoasting-revisited
https://www.youtube.com/watch?v=Yr7mxgP4mII
https://www.youtube.com/watch?v=8zkQvZSJEqA
https://www.youtube.com/watch?v=lZ99RHv87Lk