A comprehensive three-part series that documents techniques for achieving domain administrator privileges in Windows environments. The series covers various attack methodologies including password extraction from SYSVOL, lateral movement techniques, and privilege escalation methods. The content addresses common security issues found in Windows Active Directory environments and provides detailed explanations of exploitation techniques. Each part of the series builds upon previous concepts to create a continuous learning flow for understanding Windows domain compromise scenarios. The series also includes defensive measures, remediation strategies, and security recommendations to help organizations protect against the documented attack vectors. The material was presented as a talk at SteelCon 2022, providing both written documentation and conference presentation format for the research.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.
A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.
A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.
A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.
A comprehensive cheat sheet for Windows and Linux terminals and command lines, covering essential commands and syntax for various tasks.
A structured approach to managing and responding to suspected security events or incidents.
A comprehensive guide for computer security incident handling, providing guidelines for establishing incident response capabilities and handling incidents efficiently and effectively.
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.