The most significant threats to domain controllers are those that try to achieve access on domain controller towards the database of security. All the passwords and accounts of user are contained by DC; therefore computer access offers a hacker about unrestricted access towards the network. Usual assaults consist of:

  • Attaining access towards the database of security in order to adapt rights of user to offer managerial access towards unauthorized users.
  • Attaining access towards communications of domain controller through connections of network, so as to exploit, monitor and capture information of security like user passwords and accounts.
  • Attaining physical access towards server in order to copy database of security onto detachable media for soon analysis.
  • Attaining access towards domain controller in order to adapt computers on domain to permit ‘rouge’ computer so as to take part in the domain.