Offensive Active Directory Operations Certification (OADOC)

  • Dates: May 11, 12 and 13 2026
  • Difficulty: Medium
  • Session Format: Hybrid
  • Language: English

Description

The Offensive Active Directory Operations Certification (OADOC) equips students with a comprehensive, hands-on understanding of how to identify and exploit modern Active Directory misconfigurations across both Windows and Linux environments. Designed for today’s mixed and evolving enterprise ecosystems, the course covers forest functional levels from Windows Server 2016 through Server 2025, ensuring every technique you learn is relevant, current, and applicable across real-world infrastructures. You’ll develop the ability to execute multi-platform attacks, leverage cutting-edge AD abuse strategies, and customize modern, signed, and stealthy tooling for enumeration and exploitation.

The training also dives deep into bypassing today’s most common defensive mechanisms, including LDAP obfuscation, channel binding and signing protections, and SMB-based controls, while reinforcing strong operational security practices. Throughout the course, you’ll learn to enumerate and exploit enterprise systems such as Kerberos-integrated SSH, SCCM, and MSSQL using both established and novel attack techniques. OADOC delivers not only technical skill but also the instructor team’s real-world tradecraft, operational insights, and guidance on clearly communicating attack paths and realistic remediation strategies to clients and stakeholders.

Key Learning Objectives

Multi-Platform Attacks – Execute cross-platform AD exploitation with techniques applicable to both Windows and Linux.

Cutting-Edge AD Abuses – Explore exploitation strategies across various modern forest functional levels, ensuring your tradecraft stays ahead of modern defenses.

Advanced AD Toolcraft – Leverage and customize modern, signed, and stealthy tools for effective AD enumeration and exploitation.

Bypass Strategies – Master LDAP obfuscation, channel binding and signing bypasses, SMB evasion, and other modern AD defense evasion tactics.

Operational Security & Defense Considerations – Bypass EDR/AV and network identity profiling, while understanding blue team detection strategies.

Learn how to enumerate and exploit enterprise software systems such as Kerberos-integrated SSH, SCCM and MSSQL with niche and novel attack techniques.

Benefit from the instructor team's accrued knowledge of real-world successful TTPs, and learn from their opsec tips, as well as being able to communicate clearly with clients on attack paths and realistic remediation steps.

Who Should Attend?

Penetration Testers and Red Teamers: Looking to break into or advance their skillset in Active Directory exploitation and red teaming.

Blue Teamers and Defensive Security Professionals: Seeking to understand hyper-current attack techniques and enhance their detection capabilities.

Cybersecurity Professionals and Researchers: Aiming to explore cutting-edge Active Directory offensive security and modern bypass strategies.

Prerequisite Knowledge

To ensure participants are prepared for the OADOC On-Demand, students must meet the following prerequisites:

Active Directory Fundamentals – Basic understanding of Active Directory structure, authentication, and common misconfigurations.

Networking Basics – Familiarity with network protocols, Windows domains, and authentication mechanisms.

Programming Experience – Some experience with scripting (PowerShell, Python) or compiled languages (C, C++) for AD exploitation.

Windows Internals – Understanding of Windows security mechanisms, process interactions, and privilege escalation techniques.

Offensive Security Mindset – Willingness to engage with challenging labs, stealth techniques, and real-world attack methodologies.

Hardware Requirements

Participants must have an AWS account for lab deployment.

Bio

Evan Hosinski , White Knight Labs

Evan Hosinski is an Offensive Security Professional and senior penetration tester who builds, breaks, and improves systems at scale. His work combines hands-on engineering with real-world attacker tradecraft, driving him to design tools and methodologies that hold up in live environments.

As the founder of KrakenTech LLC, Evan develops offensive and defensive platforms used to identify, analyze, and respond to advanced threats including phishing and OSINT frameworks, payload delivery systems, large-scale password intelligence tooling, and real-time exploit detection.

His technical background includes custom malware development, infrastructure penetration testing, protocol abuse research, and offensive automation. He works across Python, Go, C, C#, C++, PowerShell, and multiple shell languages, with additional experience in Nim and Zig.

Evan also mentors other operators and helps shape engagement strategies that move beyond checkbox testing. His focus is simple: deliver high-impact, realistic security insights grounded in deep engineering and modern offensive techniques.

Return to training sessions