{"id":2532,"date":"2016-01-18T19:58:09","date_gmt":"2016-01-19T00:58:09","guid":{"rendered":"https:\/\/adsecurity.org\/?page_id=2532"},"modified":"2016-02-16T23:45:23","modified_gmt":"2016-02-17T04:45:23","slug":"top-posts","status":"publish","type":"page","link":"https:\/\/adsecurity.org\/?page_id=2532","title":{"rendered":"Top Posts"},"content":{"rendered":"<h4><span style=\"text-decoration: underline;\">ADSecurity.org Active Directory Security Top Posts:<\/span><\/h4>\n<ul>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2362\">Attack Methods for Gaining Domain Admin Rights in Active Directory<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?page_id=1821\">Mimikatz Guide and Command Reference<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1790\">Microsoft Local Administrator Password Solution (LAPS) <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2398\">How Attackers Dump Active Directory Database Credentials<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2535\">Active Directory Recon Without Admin Rights<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1684\">The Most Common Active Directory Security Issues and What You Can Do to Fix Them<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=483\">Kerberos &amp; KRBTGT: Active Directory\u2019s Domain Kerberos Service Account <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2288\">Finding Passwords in SYSVOL &amp; Exploiting Group Policy Preferences<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2293\">Cracking Kerberos TGS Tickets Using Kerberoast \u2013 Exploiting Kerberos to Compromise the Active Directory Domain<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?page_id=1352\">Active Directory Security Presentations<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?tag=ms14068\">MS14-068 Vulnerability, Exploitation, and Exploit Detection <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1929\">Sneaky Active Directory Persistence Tricks <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=227\">Golden Tickets are Now More Golden<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2495\">Mimikatz Update Fixes Forged Kerberos Ticket Domain Field Anomaly \u2013 Golden Ticket Invalid Domain Field Event Detection No Longer Works <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2011\">How Attackers Use Kerberos Silver Tickets to Exploit Systems<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1729\">Mimikatz DCSync Usage, Exploitation, and Detection <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=227\">Kerberos, Active Directory\u2019s Secret Decoder Ring <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2053\">Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=2483\">So You Want to Speak at a Security Conference? <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1681\">Great Active Directory Attack &amp; Defense Resources <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1667\">Active Directory Security Risk #101: Kerberos Unconstrained Delegation <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1588\">It\u2019s All About Trust \u2013 Forging Kerberos Trust Tickets to Spoof Access across Active Directory Trusts <\/a><\/li>\n<li>\u00a0<a href=\"https:\/\/adsecurity.org\/?p=1535\">Windows 10 Microsoft Passport (aka Microsoft Next Generation Credential) In Detail <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1515\"> Detecting Forged Kerberos Ticket (Golden Ticket &amp; Silver Ticket) Use in Active Directory <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1508\">SPN Scanning \u2013 Service Discovery without Network Port Scanning <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=230\">Active Directory Pentest Recon Part 1: SPN Scanning aka Mining Kerberos Service Principal Names <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1255\">Active Directory Domain Controller Skeleton Key Malware &amp; Mimikatz <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1275\">Attackers Can Now Use Mimikatz to Implant Skeleton Key on Domain Controllers &amp; BackDoor Your Active Directory Forest <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1232\">PowerShell Security: Execution Policy is Not An Effective Security Strategy \u2013 How to Bypass the PowerShell Execution Policy <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=1001\">Interesting Windows Computer &amp; Active Directory Well-Known Security Identifiers (SIDs)<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=384\">Using Group Policy Preferences for Password Management = Bad Idea <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=63\">Group Policy Preferences Password Vulnerability Now Patched <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=559\">Microsoft KB2871997: Back-Porting Windows 8.1\/Win2012R2 Enhanced Security &amp; Pass The Hash Mitigation to Windows 7, Windows 8, &amp; Windows 2008R2\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=464\">The Ultimate Movie Hacking Tool \u2013 Command Shell at Windows Logon Screen (via \u201cStickyKeys\u201d)<\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=429\">PowerShell for Pentesters <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=342\">Black Hat USA 2014 Presentation: Investigating PowerShell Attacks <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=425\">Active Directory Domain Trusts &amp; Trust Password Management <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=274\">Read-Only Domain Controller (RODC) Information <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=280\">Machine Account (AD Computer Object) Password Updates <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=113\">PowerShell: Using Active Directory .Net methods in PowerShell Part 1\u00a0 <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=192\">PowerShell: Using Active Directory .Net methods in PowerShell Part 2 <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?tag=microsoftemet\">Posts on Microsoft Enhanced Mitigation Experience Toolkit (EMET) 5 &amp; Protection Methods <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=267\">Active Directory 2012 DCPromo <\/a><\/li>\n<li><a href=\"https:\/\/adsecurity.org\/?p=81\">PowerShell Code: Get &amp; Set Active Directory Tombstone Lifetime and Active Directory Delete &amp; Recycle Operations <\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ADSecurity.org Active Directory Security Top Posts: Attack Methods for Gaining Domain Admin Rights in Active Directory Mimikatz Guide and Command Reference Microsoft Local Administrator Password Solution (LAPS) How Attackers Dump Active Directory Database Credentials Active Directory Recon Without Admin Rights The Most Common Active Directory Security Issues and What You Can Do to Fix Them &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?page_id=2532\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2532","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/pages\/2532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2532"}],"version-history":[{"count":5,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/pages\/2532\/revisions"}],"predecessor-version":[{"id":2648,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/pages\/2532\/revisions\/2648"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}