A comprehensive three-part series that documents techniques for achieving domain administrator privileges in Windows environments. The series covers various attack methodologies including password extraction from SYSVOL, lateral movement techniques, and privilege escalation methods. The content addresses common security issues found in Windows Active Directory environments and provides detailed explanations of exploitation techniques. Each part of the series builds upon previous concepts to create a continuous learning flow for understanding Windows domain compromise scenarios. The series also includes defensive measures, remediation strategies, and security recommendations to help organizations protect against the documented attack vectors. The material was presented as a talk at SteelCon 2022, providing both written documentation and conference presentation format for the research.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A comprehensive cheat sheet for using JtR (John the Ripper), a password cracking tool.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.
A comprehensive guide for system administrators to detect and identify potential security threats on Windows 2000 systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.