Active Directory Security

Active Directory Security

Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

  • Home
  • About
  • AD Resources
  • Attack Defense & Detection
  • Contact
  • Mimikatz
  • Presentations
  • Schema Versions
  • Security Resources
  • SPNs
  • Top Posts

Tag: Access management for Azure resources

May 27 2020

From Azure AD to Active Directory (via Azure) – An Unanticipated Attack Path

  • By Sean Metcalf in Cloud Security, Microsoft Security, TheCloud

For most of 2019, I was digging into Office 365 and Azure AD and looking at features as part of the development of the new Trimarc Microsoft Cloud Security Assessment which focuses on improving customer Microsoft Office 365 and Azure AD security posture. As I went through each of them, I found one that was …

Continue reading

  • Access management for Azure resources, ActiveDirectory, Azure AD PIM, Azure Owner, Azure RBAC, Azure root, AzureAD, Company Administrator, Compromise Azure Domain Controller, Compromise Azure VM, Elevate Access, EnableAdminAccount, From Azure AD to Azure, Global Admin to Azure, Global Administrator, Global Administrator Elevate Access, MFA, Microsoft.Compute/virtualMachines/runCommand/, net localgroup, Office 365 Security, PIM, Privileged Identity Manager, Run PowerShell on Azure VM, runCommand, RunPowerShellScript, User Access Administrator, Virtual Machine Contributor

Recent Posts

  • BSides Dublin – The Current State of Microsoft Identity Security: Common Security Issues and Misconfigurations – Sean Metcalf
  • DEFCON 2017: Transcript – Hacking the Cloud
  • Detecting the Elusive: Active Directory Threat Hunting
  • Detecting Kerberoasting Activity
  • Detecting Password Spraying with Security Event Auditing

Trimarc Active Directory Security Services

Have concerns about your Active Directory environment? Trimarc helps enterprises improve their security posture.

Find out how... TrimarcSecurity.com

Popular Posts

  • PowerShell Encoding & Decoding (Base64)
  • Attack Methods for Gaining Domain Admin Rights in…
  • Kerberos & KRBTGT: Active Directory’s…
  • Finding Passwords in SYSVOL & Exploiting Group…
  • Securing Domain Controllers to Improve Active…
  • Securing Windows Workstations: Developing a Secure Baseline
  • Detecting Kerberoasting Activity
  • Mimikatz DCSync Usage, Exploitation, and Detection
  • AD Reading: Windows Server 2019 Active Directory Features
  • Scanning for Active Directory Privileges &…

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Tags

ActiveDirectory Active Directory Active Directory Security ActiveDirectorySecurity ADReading AD Security ADSecurity Azure AzureAD DCSync DomainController GoldenTicket GroupPolicy HyperV Invoke-Mimikatz KB3011780 KDC Kerberos KerberosHacking KRBTGT LAPS LSASS MCM MicrosoftEMET MicrosoftWindows mimikatz MS14068 PassTheHash PowerShell PowerShellCode PowerShellHacking PowerShellv5 PowerSploit Presentation Security SilverTicket SneakyADPersistence SPN TGS TGT Windows7 Windows10 WindowsServer2008R2 WindowsServer2012 WindowsServer2012R2

Recent Posts

  • BSides Dublin – The Current State of Microsoft Identity Security: Common Security Issues and Misconfigurations – Sean Metcalf
  • DEFCON 2017: Transcript – Hacking the Cloud
  • Detecting the Elusive: Active Directory Threat Hunting
  • Detecting Kerberoasting Activity
  • Detecting Password Spraying with Security Event Auditing

Recent Comments

  • Derek on Attacking Read-Only Domain Controllers (RODCs) to Own Active Directory
  • Sean Metcalf on Securing Microsoft Active Directory Federation Server (ADFS)
  • Brad on Securing Microsoft Active Directory Federation Server (ADFS)
  • Joonas on Gathering AD Data with the Active Directory PowerShell Module
  • Sean Metcalf on Gathering AD Data with the Active Directory PowerShell Module

Archives

  • June 2024
  • May 2024
  • May 2020
  • January 2020
  • August 2019
  • March 2019
  • February 2019
  • October 2018
  • August 2018
  • May 2018
  • January 2018
  • November 2017
  • August 2017
  • June 2017
  • May 2017
  • February 2017
  • January 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • July 2013
  • November 2012
  • March 2012
  • February 2012

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Copyright

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned. Content Ownership: All content posted here is intellectual work and under the current law, the poster owns the copyright of the article. Terms of Use Copyright © 2011 - 2020.

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned.

Made with by Graphene Themes.