top of page
The HUB
Featured Posts
Scott Blake
Oct 85 min read
Limiting Domain Controller Attack Surface: Why less services, less software, less agents = less exposure.
This article is a guide to making the best-informed decisions by companies asking the right questions.
Darryl Baker
Jul 167 min read
Securing The Chink in Kerberos’ Armor, FAST! Understanding The Need For Kerberos Armoring
35 years after the first public version of Kerberos, attacks on it are still coming fast and furious. Time to armor up.
Scott Blake
Oct 17, 20238 min read
Return of The LDAP Channel Binding and LDAP Signing
It has been over two and a half years since we first touched on the subject of LDAP channel binding and LDAP signing.
Brandon Colley
Jul 1, 20227 min read
Push Comes To Shove: exploring the attack surface of SCCM Client Push Accounts
Did you know that Microsoft System Center Configuration Manager (SCCM) has been around for 28 years?
Sean Metcalf
Jun 24, 20222 min read
Webcast: Top 10 Ways to Improve Active Directory Security Quickly
This Trimarc Webcast provides information about current AD attack methods attackers are leveraging to compromise Active Directory and 10 thi
Scott Blake
Nov 19, 20218 min read
Implementing Controls in Active Directory: Protecting Against Privileged Credential Sprawl
Protecting Against Privileged Credential Sprawl. Highly privileged accounts are often used to perform tasks on systems.
Scott Blake
Jan 22, 20217 min read
LDAP Channel Binding and Signing
What Is LDAP Channel Binding and LDAP Signing?
Sean Metcalf
Dec 10, 202014 min read
Kerberos Bronze Bit Attack (CVE-2020-17049) Scenarios to Potentially Compromise Active Directory
Jake Karnes (@jakekarnes42) with NetSPI published 3 articles (that’s right 3!) describing a new attack against Microsoft’s Kerberos.
Sean Metcalf
Sep 3, 20207 min read
Escalating to Domain Admin in Microsoft’s Cloud Hosted Active Directory (Azure AD Domain Services)
the attacker could compromise the Azure AD Domain Services domain and persist at the Domain Controller and/or domain level
bottom of page