{"id":1681,"date":"2015-08-19T00:52:16","date_gmt":"2015-08-19T04:52:16","guid":{"rendered":"https:\/\/adsecurity.org\/?p=1681"},"modified":"2015-08-19T01:58:10","modified_gmt":"2015-08-19T05:58:10","slug":"great-active-directory-attack-defense-resources","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=1681","title":{"rendered":"Great Active Directory Attack &#038; Defense Resources"},"content":{"rendered":"<p>I have found the following resources to be excellent when it comes to attacking &amp; defending an enterprise with Microsoft products (Active Directory, Windows, etc). This was created in response to the many questions regarding who to follow (Twitter) or what blogs to read. \ud83d\ude42<\/p>\n<p><span style=\"text-decoration: underline;\">Microsoft Platform Security Resources:<\/span><\/p>\n<p><!--more--><\/p>\n<p>Alva \u201cSkip\u201d Duckwall<br \/>\n@passingthehash<br \/>\n<a href=\"http:\/\/passing-the-hash.blogspot.com\">http:\/\/passing-the-hash.blogspot.com<\/a><\/p>\n<p>Benjamin Delpy<br \/>\n@gentilkiwi<br \/>\n<a href=\"http:\/\/blog.gentilkiwi.com\/mimikatz\">http:\/\/blog.gentilkiwi.com\/mimikatz<br \/>\n<\/a><a href=\"https:\/\/github.com\/gentilkiwi\">https:\/\/github.com\/gentilkiwi<\/a><\/p>\n<p>Casey Smith<br \/>\n@subtee<br \/>\n<a href=\"https:\/\/github.com\/subTee\">https:\/\/github.com\/subTee<\/a><\/p>\n<p>Chris Campbell<br \/>\n@obscuresec<br \/>\n<a href=\"http:\/\/obscuresecurity.blogspot.com\/\">http:\/\/obscuresecurity.blogspot.com<\/a><\/p>\n<p>Jared Atkinson<br \/>\n@jaredcatkinson<br \/>\n<a href=\"http:\/\/www.invoke-ir.com\/\">http:\/\/www.invoke-ir.com\/<\/a><\/p>\n<p>Joe Bialek<br \/>\n@clymb3r<br \/>\n<a href=\"https:\/\/github.com\/clymb3r\/PowerShell\">https:\/\/clymb3r.wordpress.com<br \/>\nhttps:\/\/github.com\/clymb3r\/PowerShell <\/a><\/p>\n<p>John Lambert<br \/>\n@JohnLaTwC<\/p>\n<p>Justin Warner<br \/>\n@sixdub<br \/>\n<a href=\"http:\/\/www.powershellempire.com\/\">http:\/\/www.powershellempire.com\/<\/a><\/p>\n<p>Lee Holmes<br \/>\n@Lee_Holmes<\/p>\n<p>Matt Graeber<br \/>\n@mattifestation<br \/>\n<a href=\"https:\/\/github.com\/mattifestation\/PowerSploit\">http:\/\/www.exploit-monday.com<br \/>\nhttps:\/\/github.com\/mattifestation\/PowerSploit<\/a><\/p>\n<p>Microsoft Security Response<br \/>\n@msftsecresponse<\/p>\n<p>Rob Fuller<br \/>\n@mubix<br \/>\n<a href=\"http:\/\/www.room362.com\">http:\/\/www.room362.com<br \/>\nMubix Presentations on SlideShare<\/a><\/p>\n<p>Tal Be&#8217;ery<br \/>\n@TalBeerySec<\/p>\n<p>Will<br \/>\n@harmj0y<br \/>\n<a href=\"http:\/\/blog.harmj0y.net\">http:\/\/blog.harmj0y.net<\/p>\n<div class=\"embed-container\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"ND2W2Br10n\"><p><a href=\"http:\/\/www.powershellempire.com\/\">Home<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"http:\/\/www.powershellempire.com\/?embed=true#?secret=ND2W2Br10n\" data-secret=\"ND2W2Br10n\" width=\"600\" height=\"338\" title=\"&#8220;Home&#8221; &#8212; PowerShell Empire\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/div>\n<p><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I have found the following resources to be excellent when it comes to attacking &amp; defending an enterprise with Microsoft products (Active Directory, Windows, etc). This was created in response to the many questions regarding who to follow (Twitter) or what blogs to read. \ud83d\ude42 Microsoft Platform Security Resources:<\/p><p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=1681\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[565,11,2],"tags":[113,578,422,579,577,433],"class_list":["post-1681","post","type-post","status-publish","format-standard","hentry","category-activedirectorysecurity","category-microsoft-security","category-technical-reference","tag-activedirectorysecurity","tag-adsecurityresources","tag-presentation","tag-resources","tag-slides","tag-twitter","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1681"}],"version-history":[{"count":8,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":1691,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/1681\/revisions\/1691"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}