Active directory pentesting books. The second is the exploitation phase.