top of page
Security, Active Directory, Microsoft 365, PowerShell, and Windows Infrastructure
Search


Unconstrained Kerberos Delegation: Finding and Fixing It with PowerShell
Unconstrained Kerberos delegation is one of the most dangerous misconfigurations in Active Directory — and one of the most common. Any server with this flag set is silently caching TGTs for every privileged user who connects to it. Here's how to find every account configured for unconstrained delegation in your environment and fix it with PowerShell.
4 hours ago6 min read


DCSync Attack: Finding and Fixing Replication Rights in Active Directory
DCSync doesn't require a foothold on a domain controller, just one account with the right to replicate directory data. Here's how to find who has those rights in your environment, remove what doesn't belong, and detect if someone is already using this technique against you.
Apr 214 min read


AS-REP Roasting: Finding and Fixing Vulnerable Accounts with PowerShell
AS-REP Roasting requires no domain credentials and leaves most environments completely exposed. Any attacker with network access to a Domain Controller can request an encrypted hash for any account with Kerberos pre-authentication disabled and crack it offline at their leisure. Here's how to find every vulnerable account in your environment, fix the ones that matter most, and detect if someone is already taking advantage.
Apr 1510 min read


Finding and Fixing Kerberoastable Accounts with PowerShell
Kerberoasting works entirely within normal Kerberos behavior, no elevated privileges, no lockouts, no alerts. Any domain user can request a service ticket for any SPN-enabled account and walk away with a crackable hash. In most environments I've reviewed, Kerberoastable accounts exist and nobody knows about it. Here's how to find them, fix them, and detect if someone is already taking advantage.
Apr 711 min read


Active Directory Trust Security: How to Secure AD Trusts Against Exploits
Active Directory trusts enable cross-domain access, but poorly secured trusts can turn one breach into a full forest compromise. Attackers exploit transitive trusts, foreign security principals, Kerberos delegation flaws, and legacy connections. Learn how to lock down trusts with SID filtering, selective authentication, audits, and KRBTGT rotation to stop lateral movement and protect your enterprise.
Aug 7, 20254 min read
Home: Blog2
bottom of page