This document discusses red team techniques for expanding access within an Active Directory environment. It begins with introductions and defines red teaming as adversary emulation. It outlines a red team vs blue team approach and discusses setting up red team infrastructure. The document then covers various techniques for each step of a red team attack chain including gaining initial access, escalating privileges, lateral movement, and maintaining persistence. Specific tools and tactics are demonstrated like BloodHound, Mimikatz, and Golden Ticket attacks. Defense techniques like SIEM, logging, and threat intelligence are also briefly mentioned. The presentation ends with a question and answer section and credits contributors in the security field.