π [ SemperisTech, Semperis ]
Privilege escalation is a prime tool for attackers to infiltrate your #ActiveDirectory--and from there, anything they want. Learn more about a vulnerability that can enable #cyberattackers to target AD Certificate Services and take over your domain. https://t.co/rwUp9tIiAn
π https://www.semperis.com/blog/ad-vulnerability-cve-2022-26923/
π₯ [ tweet ]
Privilege escalation is a prime tool for attackers to infiltrate your #ActiveDirectory--and from there, anything they want. Learn more about a vulnerability that can enable #cyberattackers to target AD Certificate Services and take over your domain. https://t.co/rwUp9tIiAn
π https://www.semperis.com/blog/ad-vulnerability-cve-2022-26923/
π₯ [ tweet ]
π [ 7h3h4ckv157, 7h3h4ckv157 ]
AD MindMap
#ActiveDirectory #pwn #infosec
https://t.co/4XY5sF1qMR
π https://www.xmind.app/m/874LNH/
π₯ [ tweet ]
AD MindMap
#ActiveDirectory #pwn #infosec
https://t.co/4XY5sF1qMR
π https://www.xmind.app/m/874LNH/
π₯ [ tweet ]
π₯2
π [ nikhil_mitt, Nikhil Mittal ]
TIL that it is possible to exclude Account Operators, Server Operators, Print Operators and Backup Operators from SDProp/AdminSDHolder! #ActiveDirectory #RedTeam
https://t.co/kzatGP3RfD
π https://petri.com/active-directory-security-understanding-adminsdholder-object/
π₯ [ tweet ]
TIL that it is possible to exclude Account Operators, Server Operators, Print Operators and Backup Operators from SDProp/AdminSDHolder! #ActiveDirectory #RedTeam
https://t.co/kzatGP3RfD
π https://petri.com/active-directory-security-understanding-adminsdholder-object/
π₯ [ tweet ]
π [ PrzemysΕaw KΕys @PrzemyslawKlys ]
If you're into #ActiveDirectory, keep it clean from stale objects. CleanupMonster, my new #PowerShell module, can help you with that. I wrote a blog post about it to make it easier to implement.
It has fancy reporting and lots of customizations:
π https://evotec.xyz/mastering-active-directory-hygiene-automating-stale-computer-cleanup-with-cleanupmonster/
π₯ [ tweet ]
If you're into #ActiveDirectory, keep it clean from stale objects. CleanupMonster, my new #PowerShell module, can help you with that. I wrote a blog post about it to make it easier to implement.
It has fancy reporting and lots of customizations:
π https://evotec.xyz/mastering-active-directory-hygiene-automating-stale-computer-cleanup-with-cleanupmonster/
π₯ [ tweet ]
π7
π [ Logan Goins @_logangoins ]
I just published a blog post focused on details of using offensive .NET for both enumeration and exploitation of #activedirectory environments! Including some customized code examples from a tool I've been developing!
π https://logan-goins.com/2024-10-11-Dotnet-AD/
π https://github.com/logangoins/Cable
π₯ [ tweet ]
#Π΄Π»Ρ_ΡΠ°ΠΌΡΡ _ΠΌΠ°Π»Π΅Π½ΡΠΊΠΈΡ
I just published a blog post focused on details of using offensive .NET for both enumeration and exploitation of #activedirectory environments! Including some customized code examples from a tool I've been developing!
π https://logan-goins.com/2024-10-11-Dotnet-AD/
π https://github.com/logangoins/Cable
π₯ [ tweet ]
#Π΄Π»Ρ_ΡΠ°ΠΌΡΡ _ΠΌΠ°Π»Π΅Π½ΡΠΊΠΈΡ
π5π₯1