Give me Active directory pentest checklist

Pre-Engagement Activities

Information Gathering

User Enumeration

Exploitation of Weak Credentials

Privilege Escalation

Lateral Movement

Post-Exploitation

Reporting

Remediation and Follow-Up

Related Checklists