top of page
Security, Active Directory, Microsoft 365, PowerShell, and Windows Infrastructure
Search


AS-REP Roasting: Finding and Fixing Vulnerable Accounts with PowerShell
AS-REP Roasting requires no domain credentials and leaves most environments completely exposed. Any attacker with network access to a Domain Controller can request an encrypted hash for any account with Kerberos pre-authentication disabled and crack it offline at their leisure. Here's how to find every vulnerable account in your environment, fix the ones that matter most, and detect if someone is already taking advantage.
6 days ago10 min read


Finding and Fixing Kerberoastable Accounts with PowerShell
Kerberoasting works entirely within normal Kerberos behavior, no elevated privileges, no lockouts, no alerts. Any domain user can request a service ticket for any SPN-enabled account and walk away with a crackable hash. In most environments I've reviewed, Kerberoastable accounts exist and nobody knows about it. Here's how to find them, fix them, and detect if someone is already taking advantage.
Apr 711 min read


Active Directory Trust Security: How to Secure AD Trusts Against Exploits
Active Directory trusts enable cross-domain access, but poorly secured trusts can turn one breach into a full forest compromise. Attackers exploit transitive trusts, foreign security principals, Kerberos delegation flaws, and legacy connections. Learn how to lock down trusts with SID filtering, selective authentication, audits, and KRBTGT rotation to stop lateral movement and protect your enterprise.
Aug 7, 20254 min read
Home: Blog2
bottom of page