{"id":4706,"date":"2025-10-04T20:03:00","date_gmt":"2025-10-05T00:03:00","guid":{"rendered":"https:\/\/adsecurity.org\/?p=4706"},"modified":"2025-10-07T11:24:01","modified_gmt":"2025-10-07T15:24:01","slug":"active-directory-security-history","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=4706","title":{"rendered":"The History of Active Directory Security"},"content":{"rendered":"\n<p>During the Summer of 2024, I had a talk at <a href=\"https:\/\/troopers.de\/troopers24\/\" data-type=\"link\" data-id=\"https:\/\/troopers.de\/troopers24\/\">Troopers <\/a>called &#8220;<span style=\"text-decoration: underline;\">A Decade of Active Directory Attacks:<br>What We&#8217;ve Learned &amp; What&#8217;s Next<\/span>&#8221; (<a href=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2025\/08\/2024-Troopers-DecadeofADSecurity-Metcalf-Final.pdf\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2025\/08\/2024-Troopers-DecadeofADSecurity-Metcalf-Final.pdf\">Slides <\/a>&amp; <a href=\"https:\/\/www.youtube.com\/watch?v=iTS14FhRlVA&amp;feature=youtu.be\" data-type=\"link\" data-id=\"https:\/\/www.youtube.com\/watch?v=iTS14FhRlVA&amp;feature=youtu.be\">Video<\/a>) where I focused on the key milestones of Active Directory security (history). This article covers my &#8220;decade of Active Directory attacks&#8221; in some detail which was correlated with public information and GitHub release information. This Active Directory security history article breaks down the notable attacks into a timeline starting with Active Directory&#8217;s release in 2000 and continuing until the present day in late 2025.<br>If you are interested in the history of Activ<a href=\"https:\/\/adsecurity.org\/?page_id=4031\" data-type=\"page\" data-id=\"4031\">e<\/a> Directory, <a href=\"https:\/\/practical365.com\/celebrating-25-years-of-active-directory\/\" data-type=\"link\" data-id=\"https:\/\/practical365.com\/celebrating-25-years-of-active-directory\/\">this is the article <\/a>for you.<br><br>If you have anything to add or update on the History of Active Directory Security, please email me: sean[@]adsecurity[dot]org.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u201cBaby Steps\u201d (2000 \u2013 2009)<\/strong><\/h2>\n\n\n\n<p>We start with a time period I call \u201cBaby Steps\u201d (2000 \u2013 2009). This is where some of the key attack capability still in use today was developed.<\/p>\n\n\n\n<p><strong>April,<\/strong> <strong>1997<\/strong>: Paul Ashton posted to NTBugtraq about \u201c<a href=\"https:\/\/www.exploit-db.com\/exploits\/19197\" data-type=\"link\" data-id=\"https:\/\/www.exploit-db.com\/exploits\/19197\">&#8216;Pass the Hash&#8217; with Modified SMB Client<\/a>\u201d leveraging the username and LanMan hash against Windows NT.<\/p>\n\n\n\n<p><strong>February 17, 2000<\/strong>: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Active_Directory\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Active_Directory\">Active Directory<\/a> released as part of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Windows_2000\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Windows_2000\">Windows 2000<\/a> (RTM was December 5, 1999 while retail release was February 17, 2000). <\/p>\n\n\n\n<p><strong>March, 2001<\/strong>: Sir Dystic of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cult_of_the_Dead_Cow\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Cult_of_the_Dead_Cow\">Cult of the Dead Cow (cDc)<\/a> releases <a href=\"https:\/\/en.wikipedia.org\/wiki\/SMBRelay\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/SMBRelay\">SMBRelay and SMBRelay2<\/a>.<\/p>\n\n\n\n<p><strong>2007<\/strong>: <a href=\"https:\/\/github.com\/nomex\/nbnspoof?tab=readme-ov-file\">NBNSpoof tool <\/a>created by Robert Wesley McGrew (LLMNR\/NBT-NS).<\/p>\n\n\n\n<p><strong>July 2008<\/strong>: Hernan Ochoa <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pass_the_hash\">publishes the &#8220;Pass-the-Hash Toolkit\u201c <\/a>(later called WCE and was the inspiration for Mimikatz).<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>&#8220;The Wonder Years&#8221; (2010 &#8211; 2014) <\/strong><\/h2>\n\n\n\n<p>The next time period I call &#8220;The Wonder Years&#8221; (2010 &#8211; 2014) which is where some key Active Directory attack elements are created.<\/p>\n\n\n\n<p><strong>March 2010:<\/strong> <a href=\"https:\/\/www.ampliasecurity.com\/research\/wcefaq.html\">Windows Credentials Editor (WCE)<\/a> &amp; <a href=\"https:\/\/www.ampliasecurity.com\/research\/WCE_Internals_RootedCon2011_ampliasecurity.pdf\">RootedCon presentation <\/a>by Hernan Ochoa. WCE was the first tool that provided capability to dump in-memory credentials without running code inside of LSASS. <a href=\"https:\/\/attack.mitre.org\/software\/S0005\/\">ID: S0005<\/a><\/p>\n\n\n\n<p><strong>May 2011<\/strong>: First version of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Mimikatz\">Mimikatz<\/a> tool released by<a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\"> Benjamin Delpy<\/a>. <a href=\"https:\/\/attack.mitre.org\/software\/S0002\/\">ID:&nbsp;S0002<\/a><br><a href=\"https:\/\/adsecurity.org\/?page_id=1821\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?page_id=1821\">ADSecurity Unofficial Guide to Mimikatz<\/a> (no longer updated)<\/p>\n\n\n\n<p><strong>2012<\/strong>: <a href=\"http:\/\/esec-pentest.sogeti.com\/exploiting-windows-2008-group-policy-preferences\">Exploiting Windows 2008 Group Policy Preferences <\/a>by Emilien Giraul. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1552\/006\/\">ID: T1552.006<\/a><\/p>\n\n\n\n<p><strong>May 2012<\/strong>: <a href=\"https:\/\/x.com\/obscuresec\" data-type=\"link\" data-id=\"https:\/\/x.com\/obscuresec\">Chris Campbell<\/a>\u2019s <a href=\"http:\/\/obscuresecurity.blogspot.com\/2012\/05\/gpp-password-retrieval-with-powershell.html\" data-type=\"link\" data-id=\"http:\/\/obscuresecurity.blogspot.com\/2012\/05\/gpp-password-retrieval-with-powershell.html\">post on GPP Passwords<\/a>. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1552\/006\/\">ID: T1552.006<\/a><br><a href=\"https:\/\/adsecurity.org\/?p=2288\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=2288\">ADSecurity article on Group Policy Preference Passwords<\/a><\/p>\n\n\n\n<p><strong>October 2012<\/strong>: <a href=\"https:\/\/g-laurent.blogspot.com\/2012\/10\/introducing-responder-10.html\">Responder v1<\/a> tool released by Laurent Gaffie. Responder was a tool that leveraged LLMNR and Netbios protocol weaknesses enabling password hash capture on the network. <a href=\"https:\/\/attack.mitre.org\/software\/S0174\/\">ID: S0174<\/a><\/p>\n\n\n\n<p><strong>October 2013<\/strong>: <a href=\"https:\/\/github.com\/PowerShellMafia\/PowerSploit\/blob\/master\/Exfiltration\/Invoke-Mimikatz.ps1\">Invoke-Mimikatz<\/a> PowerShell version of Mimikatz released by Joe Bialek. This PowerShell script leverages <a href=\"https:\/\/clymb3r.wordpress.com\/2013\/04\/06\/reflective-dll-injection-with-powershell\/\">reflective DLL injection<\/a> in order to load Mimikatz in PowerShell.<\/p>\n\n\n\n<p><strong>August 2014<\/strong>: \u201c<a href=\"https:\/\/www.blackhat.com\/docs\/us-14\/materials\/us-14-Duckwall-Abusing-Microsoft-Kerberos-Sorry-You-Guys-Don%27t-Get-It.pdf\">Abusing Microsoft Kerberos sorry you guys don\u2019t get it<\/a>\u201d Black Hat presentation by <a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\">Benjamin Delpy<\/a> &amp; <a href=\"https:\/\/x.com\/passingthehash\" data-type=\"link\" data-id=\"https:\/\/x.com\/passingthehash\">Skip Duckwell<\/a> which covered Golden Tickets (<a href=\"http:\/\/attack.mitre.org\/techniques\/T1558\/001\/\">ID: T1558.001<\/a>), Overpass-the-hash, and Pass-the-ticket (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1550\/003\/\">ID: T1550.003<\/a>) techniques. This talk caused a revolutionary shift in offensive capability.<br><a href=\"https:\/\/adsecurity.org\/?p=1640\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=1640\">ADSecurity article on Golden Ticket attack<\/a><\/p>\n\n\n\n<p><strong>September 2014<\/strong>: <a href=\"http:\/\/passing-the-hash.blogspot.com\/2014\/09\/pac-validation-20-minute-rule-and.html\">PAC Validation, The 20 Minute Rule and Exceptions (BHUSA 2014 part deux) <\/a>blog post about Silver Tickets (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1558\/002\/\">ID: T1558.002<\/a>) by <a href=\"https:\/\/x.com\/passingthehash\" data-type=\"link\" data-id=\"https:\/\/x.com\/passingthehash\">Skip Duckwell<\/a>.<br><a href=\"https:\/\/adsecurity.org\/?p=2011\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=2011\">ADSecurity article on Silver Tickets<\/a><\/p>\n\n\n\n<p><strong>September 2014<\/strong>: <a href=\"https:\/\/www.redsiege.com\/wp-content\/uploads\/2020\/08\/Kerberoastv4.pdf\">Kerberoast<\/a> released by <a href=\"https:\/\/x.com\/TimMedin\" data-type=\"link\" data-id=\"https:\/\/x.com\/TimMedin\">Tim Medin<\/a> at <a href=\"https:\/\/en.wikipedia.org\/wiki\/DerbyCon\" data-type=\"link\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/DerbyCon\">DerbyCon<\/a>. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1558\/003\/\">ID: T1558.003<\/a><br>Kerberoasting is still successfully used against Active Directory environments along with Password Spraying.<br><a href=\"https:\/\/adsecurity.org\/?p=2293\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=2293\">ADSecurity article on Kerberoast attack<\/a><\/p>\n\n\n\n<p><strong>December 2014<\/strong>: <a href=\"https:\/\/github.com\/PowerShellMafia\/PowerSploit\/commit\/5fb690518d6fed522c57fcf0a33a4ca4d3b664af\">PowerView<\/a> tool released by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a>. This enabled easy Active Directory reconnaissance using PowerShell. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Golden Years <strong>(2015 &#8211; 2019)<\/strong><\/h2>\n\n\n\n<p>Following the &#8220;Wonder Years&#8221; is the time period I call &#8220;The Golden Years&#8221; (2015 &#8211; 2019) where most of the attacks came from.<\/p>\n\n\n\n<p><strong>2015<\/strong>: <a href=\"https:\/\/www.dsinternals.com\/\">DSInternals<\/a> tool <a href=\"https:\/\/www.dsinternals.com\/en\/retrieving-active-directory-passwords-remotely\/\">released<\/a> by <a href=\"https:\/\/x.com\/MGrafnetter\" data-type=\"link\" data-id=\"https:\/\/x.com\/MGrafnetter\">Michael Grafnetter<\/a>. This PowerShell module combines a number of useful attack tools.<\/p>\n\n\n\n<p><strong>2015<\/strong>: <a href=\"https:\/\/github.com\/gentilkiwi\/kekeo\">Kekeo<\/a> tool released by <a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\">Benjamin Delpy<\/a>. This was Benjamin&#8217;s tool to play around with Kerberos.<\/p>\n\n\n\n<p><strong>2015<\/strong>: <a href=\"https:\/\/github.com\/mattifestation\/PowerSploit\" data-type=\"link\" data-id=\"https:\/\/github.com\/mattifestation\/PowerSploit\">PowerSploit toolset<\/a> released by Matt Graeber. <a href=\"https:\/\/attack.mitre.org\/software\/S0194\/\">ID: S0194<\/a><br><a href=\"https:\/\/adsecurity.org\/?p=2921\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=2921\">ADSecurity article on PowerShell attack tool detection<\/a><\/p>\n\n\n\n<p><strong>May 2015<\/strong>: <a href=\"https:\/\/github.com\/fortra\/impacket\/releases\/tag\/impacket_0_9_13\">Impacket<\/a> tool released by <a href=\"https:\/\/x.com\/agsolino\" data-type=\"link\" data-id=\"https:\/\/x.com\/agsolino\">Alberto Solino<\/a> (asolino). <a href=\"https:\/\/attack.mitre.org\/software\/S0357\/\">ID: S0357<\/a><br>Impacket grew to be one of the key attack tools against Active Directory.<\/p>\n\n\n\n<p><strong>May 2015<\/strong>: Method to <a href=\"https:\/\/adsecurity.org\/?p=1515\">Detect Golden Tickets<\/a> by <a href=\"https:\/\/x.com\/PyroTek3\" data-type=\"link\" data-id=\"https:\/\/x.com\/PyroTek3\">Sean Metcalf<\/a>. First detection of Golden Tickets based on event log anomalies that were later removed in Mimikatz.<\/p>\n\n\n\n<p><strong>August<\/strong> <strong>2015<\/strong>: <a href=\"https:\/\/github.com\/EmpireProject\/Empire\/\">PowerShell Empire <\/a>released by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a> &amp; <a href=\"https:\/\/x.com\/sixdub\" data-type=\"link\" data-id=\"https:\/\/x.com\/sixdub\">Justin Warner<\/a>. <a href=\"https:\/\/attack.mitre.org\/software\/S0363\/\">ID: S0363<\/a><br>This PowerShell attack platform combined a number of useful tools including recon and exploitation.<\/p>\n\n\n\n<p><strong>August 2015<\/strong>:\u00a0 <a href=\"https:\/\/adsecurity.org\/?p=1729\">DCSync update<\/a> to Mimikatz by <a href=\"https:\/\/x.com\/mysmartlogon\" data-type=\"link\" data-id=\"https:\/\/x.com\/mysmartlogon\">Vincent Le Toux<\/a> &amp; <a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\">Benjamin Delpy<\/a>. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/006\/\">ID: T1003.006<\/a><br>DCSync represented a strategic shift where getting on Domain Controllers to capture password hashes was no longer necessary.<br><a href=\"https:\/\/adsecurity.org\/?p=1729\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=1729\">ADSecurity article on DCSync capability &amp; detection<\/a><\/p>\n\n\n\n<p><strong>August 2015<\/strong>: Black Hat 2015 presentation by <a href=\"https:\/\/x.com\/PyroTek3\" data-type=\"link\" data-id=\"https:\/\/x.com\/PyroTek3\">Sean Metcalf<\/a>:&nbsp; <a href=\"https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf\">Unconstrained Delegation risks <\/a>&amp;<br>ADSecurity articles: <a href=\"https:\/\/adsecurity.org\/?p=1640\">Golden Tickets more powerful<\/a> &amp; <a href=\"https:\/\/adsecurity.org\/?p=1906\">Active Directory Persistence using AdminSDHolder<\/a>.<\/p>\n\n\n\n<p><strong>September 2015<\/strong>: <a href=\"https:\/\/github.com\/byt3bl33d3r\/CrackMapExec\/releases\/tag\/v1.0.0\">CrackMapExec v1.0.0 <\/a>tool released by <a href=\"https:\/\/x.com\/byt3bl33d3r\" data-type=\"link\" data-id=\"https:\/\/x.com\/byt3bl33d3r\">Marcello aka byt3bl33d3r<\/a>. <a href=\"https:\/\/attack.mitre.org\/software\/S0488\/\">ID: S0488<\/a><br>CrackMapExec combined useful attack tools in to a single tool.<\/p>\n\n\n\n<p><strong>September 2015<\/strong>: <a href=\"https:\/\/adsecurity.org\/?p=1738\">DerbyCon 2015 presentation <\/a>by <a href=\"https:\/\/x.com\/PyroTek3\" data-type=\"link\" data-id=\"https:\/\/x.com\/PyroTek3\">Sean Metcalf<\/a>: <a href=\"https:\/\/adsecurity.org\/?p=1785\">Attacking Directory Services Restore Mode (DSRM)<\/a>. This presentation disclosed the fact that the DSRM account on Domain Controllers is actually the local Administrator (RID 500) account and that is possible to pass the hash for this account (discovered with  <a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\">Benjamin Delpy<\/a>).<\/p>\n\n\n\n<p><strong>December 2015<\/strong>: <a href=\"https:\/\/www.dsinternals.com\/en\/retrieving-cleartext-gmsa-passwords-from-active-directory\/\">Attacking\u00a0 Group Managed Service Accounts (GMSAs) <\/a>by <a href=\"https:\/\/x.com\/MGrafnetter\" data-type=\"link\" data-id=\"https:\/\/x.com\/MGrafnetter\">Michael Grafnetter<\/a>.<br>This article describes some ways to take advantage of GMSAs.<br><a href=\"https:\/\/adsecurity.org\/?p=4367\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=4367\">ADSecurity article on attacking GMSAs<\/a>.<\/p>\n\n\n\n<p><strong>August 2016<\/strong>: <a href=\"https:\/\/github.com\/BloodHoundAD\/BloodHound\/releases\/tag\/v1.0.0\">Bloodhound<\/a> tool <a href=\"https:\/\/www.youtube.com\/watch?v=wP8ZCczC1OU\">released at DEFCON 23<\/a> originally written by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a>, <a href=\"https:\/\/x.com\/CptJesus\" data-type=\"link\" data-id=\"https:\/\/x.com\/CptJesus\">Rohan Vazarkar<\/a>, &amp; <a href=\"https:\/\/x.com\/_wald0\" data-type=\"link\" data-id=\"https:\/\/x.com\/_wald0\">Andy Robbins<\/a>. <a href=\"https:\/\/attack.mitre.org\/software\/S0521\/\">ID: S0521<\/a><br>Bloodhound grew from an attack tool into a tool for both Red and Blue teams mapping out attack paths and identifying key items that can resolve multiple issues.<\/p>\n\n\n\n<p><strong>January 2017<\/strong>: <a href=\"https:\/\/github.com\/vletoux\/pingcastle\/releases\/download\/2.4.0.1\/PingCastle_2.4.0.1.zip\" target=\"_blank\" rel=\"noreferrer noopener\">PingCastle 2.4.0.1<\/a>\u00a0released. <a href=\"https:\/\/www.pingcastle.com\/\" data-type=\"link\" data-id=\"https:\/\/www.pingcastle.com\/\">PingCastle <\/a>scans for Active Directory security issues and provides steps to resolve them.<\/p>\n\n\n\n<p><strong>February 2017<\/strong>: <a href=\"https:\/\/adsecurity.org\/?p=3513\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=3513\">Detect Kerberoasting <\/a>with no false positives by <a href=\"https:\/\/x.com\/PyroTek3\" data-type=\"link\" data-id=\"https:\/\/x.com\/PyroTek3\">Sean Metcalf<\/a>.<\/p>\n\n\n\n<p><strong>May 2017<\/strong>: <a href=\"https:\/\/medium.com\/@esnesenon\/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83\">DNS Admin to Domain Admin<\/a> by Shay Ber.<br><a href=\"https:\/\/adsecurity.org\/?p=4064\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=4064\">ADSecurity article on this<\/a><br><br><strong>May 2017<\/strong>: <a href=\"https:\/\/byt3bl33d3r.github.io\/automating-the-empire-with-the-death-star-getting-domain-admin-with-a-push-of-a-button.html\">Death Star<\/a> <a href=\"https:\/\/github.com\/byt3bl33d3r\/DeathStar\">python script <\/a>released by <a href=\"https:\/\/x.com\/byt3bl33d3r\" data-type=\"link\" data-id=\"https:\/\/x.com\/byt3bl33d3r\">byt3bl33d3r<\/a><br>This Python script provides a one-step identification to Domain Admin.<\/p>\n\n\n\n<p><strong>May 2017<\/strong>: <a href=\"https:\/\/blog.fox-it.com\/2017\/05\/09\/relaying-credentials-everywhere-with-ntlmrelayx\/\">Ntlmrelayx<\/a> tool released by Fox-IT<\/p>\n\n\n\n<p><strong>August 2017<\/strong>: <a href=\"https:\/\/www.blackhat.com\/docs\/us-17\/wednesday\/us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors.pdf\">ACE up the Sleeve Black Hat 2017 presentation <\/a>by <a href=\"https:\/\/x.com\/_wald0\" data-type=\"link\" data-id=\"https:\/\/x.com\/_wald0\">Andy Robbins<\/a> and <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a> which covered 5 primary items: A Hidden DCSync Backdoor, AdminSDHolder, Exploitation, Exchange Strikes Back, and Abusing GPOs.<\/p>\n\n\n\n<p><strong>September 2017<\/strong>: <a href=\"https:\/\/posts.specterops.io\/sharphound-evolution-of-the-bloodhound-ingestor-3b46643ccbd8\">Sharphound<\/a> tool release<br>Sharphound was the C# port replacing the PowerShell ingester with tons of speed and efficiency updates.<\/p>\n\n\n\n<p><strong>2018<\/strong>: <a href=\"https:\/\/github.com\/dirkjanm\/ldapdomaindump\/releases\/tag\/v0.9.0\">Ldapdomaindump<\/a> tool released by <a href=\"https:\/\/x.com\/_dirkjan\" data-type=\"link\" data-id=\"https:\/\/x.com\/_dirkjan\">Dirk-jan Molema<\/a><\/p>\n\n\n\n<p><strong>January 2018<\/strong>: <a href=\"https:\/\/adsecurity.org\/?p=3592\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=3592\">ADSecurity article<\/a> describing how to attack Read-Only Domain Controllers (RODCs).<\/p>\n\n\n\n<p><strong>February 2018<\/strong>: <a href=\"https:\/\/github.com\/dirkjanm\/BloodHound.py\/commit\/875ed429798f6ee20d9e024e36c66470e3913a8f\">Bloodhound.py <\/a>tool released by <a href=\"https:\/\/x.com\/_dirkjan\" data-type=\"link\" data-id=\"https:\/\/x.com\/_dirkjan\">Dirk-jan Molema<\/a> (Python based Bloodhound ingester)<\/p>\n\n\n\n<p><strong>July 2018<\/strong>: <a href=\"https:\/\/posts.specterops.io\/ghostpack-d835018c5fc4\">GhostPack<\/a> released\u00a0 as a collection of C# ports of popular PowerShell tools and collects these tools together<br><br><strong>August 2018<\/strong>: <a href=\"https:\/\/www.dcshadow.com\/\">DCShadow attack <\/a>by <a href=\"https:\/\/x.com\/mysmartlogon\" data-type=\"link\" data-id=\"https:\/\/x.com\/mysmartlogon\">Vincent Le Toux<\/a> &amp; <a href=\"https:\/\/x.com\/gentilkiwi\" data-type=\"link\" data-id=\"https:\/\/x.com\/gentilkiwi\">Benjamin Delpy<\/a>. <a href=\"https:\/\/attack.mitre.org\/techniques\/T1207\/\">ID: T1207<\/a><br>The DCShadow attack mapped out how to create a temporaery &#8220;Domain Controller&#8221;, use it to make changes to Active Directory, and subsequently make this temporary DC disappear.<\/p>\n\n\n\n<p><strong>September 2018<\/strong>: <a href=\"https:\/\/posts.specterops.io\/from-kekeo-to-rubeus-86d2ec501c14\">Rubeus<\/a> tool released by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a> (port of <a href=\"https:\/\/github.com\/gentilkiwi\/kekeo\" data-type=\"link\" data-id=\"https:\/\/github.com\/gentilkiwi\/kekeo\">Kekeo <\/a>and added to <a href=\"https:\/\/github.com\/ghostpack\" data-type=\"link\" data-id=\"https:\/\/github.com\/ghostpack\">GhostPack<\/a>). <a href=\"https:\/\/attack.mitre.org\/software\/S1071\/\">ID: S1071<\/a><\/p>\n\n\n\n<p><strong>October 2018<\/strong>: \u201cPrinter Bug\u201d AD priv esc <a href=\"https:\/\/www.youtube.com\/watch?v=-bcWZQCLk_4\">talk at DerbyCon <\/a>by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a>, <a href=\"https:\/\/x.com\/tifkin_\" data-type=\"link\" data-id=\"https:\/\/x.com\/tifkin_\">Lee Christensen<\/a>, &amp; <a href=\"https:\/\/x.com\/enigma0x3\" data-type=\"link\" data-id=\"https:\/\/x.com\/enigma0x3\">Matt Nelson<\/a><br><a href=\"https:\/\/adsecurity.org\/?p=4056\" data-type=\"link\" data-id=\"https:\/\/adsecurity.org\/?p=4056\">ADSecurity article on this<\/a><\/p>\n\n\n\n<p><strong>January 2019<\/strong>:  <a href=\"https:\/\/github.com\/dirkjanm\/PrivExchange\/commit\/defaacb38207e5faf577b47812ac4757785a32d7\">PrivExchange<\/a> tool released by <a href=\"https:\/\/x.com\/_dirkjan\" data-type=\"link\" data-id=\"https:\/\/x.com\/_dirkjan\">Dirk-jan Molema<\/a><\/p>\n\n\n\n<p><strong>January 2019<\/strong>: <a href=\"https:\/\/shenaniganslabs.io\/2019\/01\/28\/Wagging-the-Dog.html\">Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory<\/a> by <a href=\"https:\/\/x.com\/elad_shamir\" data-type=\"link\" data-id=\"https:\/\/x.com\/elad_shamir\">Elad Shamir<\/a><br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u201cThe Third Age\u201d (2020 \u2013 Present)<\/strong><\/h2>\n\n\n\n<p>We are currently in what I refer to as the &#8220;Third Age&#8221; which is mostly refinements of existing techniques and tools with some notable novel techniques thrown in for good measure.<\/p>\n\n\n\n<p><strong>August 2020<\/strong>: <a href=\"https:\/\/adsecurity.org\/?p=4510\" data-type=\"post\" data-id=\"4510\">The Art of the Honeypot Account article published<\/a> that describes how best to configure Active Directory honeypot accounts.<\/p>\n\n\n\n<p><strong>December 2020<\/strong>: <a href=\"https:\/\/github.com\/lkarlslund\/Adalanche\/releases\/tag\/r20201224\">Adalanche<\/a> tool released by <a href=\"https:\/\/x.com\/lkarlslund\" data-type=\"link\" data-id=\"https:\/\/x.com\/lkarlslund\">Lars Karlslund<\/a>.<\/p>\n\n\n\n<p><strong>March 2021<\/strong>: <a href=\"https:\/\/www.semperis.com\/purple-knight\/\" data-type=\"link\" data-id=\"https:\/\/www.semperis.com\/purple-knight\/\">Purple Knight<\/a> released.<\/p>\n\n\n\n<p><strong>April 2021<\/strong>: <a href=\"https:\/\/github.com\/antonioCoco\/RemotePotato0\/releases\/tag\/0.1\">RemotePotato0<\/a> tool released by Antonio Cocomazzi &amp; <a href=\"https:\/\/www.sentinelone.com\/labs\/relaying-potatoes-another-unexpected-privilege-escalation-vulnerability-in-windows-rpc-protocol\/\">article<\/a> by Antonio Cocomazzi and Andrea Pierini.<\/p>\n\n\n\n<p><strong>July 2021<\/strong>: <a href=\"https:\/\/github.com\/topotam\/PetitPotam\">PetitPotam<\/a> tool released. <em>PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw<\/em>.<\/p>\n\n\n\n<p><strong>August 2021<\/strong>: <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-Certified-Pre-Owned-Abusing-Active-Directory-Certificate-Services.pdf\">Certified Pre-Owned<\/a> (ADCS Attacks) Black Hat talk by  <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a> &amp; <a href=\"https:\/\/x.com\/tifkin_\" data-type=\"link\" data-id=\"https:\/\/x.com\/tifkin_\">Lee Christensen<\/a> (ESC 1 to ESC7). <a href=\"https:\/\/specterops.io\/wp-content\/uploads\/sites\/3\/2022\/06\/Certified_Pre-Owned.pdf\">Whitepaper download<\/a>.<\/p>\n\n\n\n<p><strong>August 2021<\/strong>: <a href=\"https:\/\/github.com\/GhostPack\/Certify\">Certify<\/a> ADCS tool released by <a href=\"https:\/\/x.com\/harmj0y\" data-type=\"link\" data-id=\"https:\/\/x.com\/harmj0y\">Will Schroeder<\/a> &amp; <a href=\"https:\/\/x.com\/tifkin_\" data-type=\"link\" data-id=\"https:\/\/x.com\/tifkin_\">Lee Christensen<\/a> (in <a href=\"https:\/\/github.com\/ghostpack\" data-type=\"link\" data-id=\"https:\/\/github.com\/ghostpack\">GhostPack<\/a>).<\/p>\n\n\n\n<p><strong>October 2021<\/strong>: <a href=\"https:\/\/googleprojectzero.blogspot.com\/2021\/10\/using-kerberos-for-authentication-relay.html\">Kerberos Relay Attack <\/a>by <a href=\"https:\/\/x.com\/tiraniddo\" data-type=\"link\" data-id=\"https:\/\/x.com\/tiraniddo\">James Forshaw<\/a>.<\/p>\n\n\n\n<p><strong>October 2021<\/strong>: <a href=\"https:\/\/github.com\/ly4k\/Certipy\/commit\/70a94feccfacdb27b170394ee30ca91f5a9cab2c\">Certipy<\/a> tool released by <a href=\"https:\/\/x.com\/ly4k_\" data-type=\"link\" data-id=\"https:\/\/x.com\/ly4k_\">Oliver Lyak (ly4k)<\/a> &#8211; Python port of the Certify tool.<\/p>\n\n\n\n<p><strong>November 2021<\/strong>: \u201c<a href=\"https:\/\/i.blackhat.com\/EU-21\/Wednesday\/EU-21-Sheinfeld-Is-This-My-Domain-Controller.pdf\">Is This My Domain Controller<\/a>\u201d Black Hat talk by Sagi Sheinfeld (<a href=\"https:\/\/x.com\/sagish1233\" data-type=\"link\" data-id=\"https:\/\/x.com\/sagish1233\">@sagish1233<\/a>), Eyal Karni (<a href=\"https:\/\/x.com\/eyal_karni\" data-type=\"link\" data-id=\"https:\/\/x.com\/eyal_karni\">@eyal_karni<\/a>), &amp; Yaron Zinar (<a href=\"https:\/\/x.com\/YaronZi\" data-type=\"link\" data-id=\"https:\/\/x.com\/YaronZi\">@YaronZi<\/a>).<\/p>\n\n\n\n<p><strong>April 2022<\/strong>: <a href=\"https:\/\/github.com\/Dec0ne\/KrbRelayUp\/commit\/548f5bf07a60ecbdfbeb342ee8968992f0917f04\">KrbRelayUp tool released <\/a>by <a href=\"https:\/\/x.com\/dec0ne\" data-type=\"link\" data-id=\"https:\/\/x.com\/dec0ne\">Dec0ne<\/a>.<\/p>\n\n\n\n<p><strong>July 2023<\/strong>: <a href=\"https:\/\/github.com\/jakehildreth\/Locksmith\" data-type=\"link\" data-id=\"https:\/\/github.com\/jakehildreth\/Locksmith\">Locksmith <\/a>Active Directory Certificate Services (ADCS) issue scan &amp; fix tool <a href=\"https:\/\/github.com\/jakehildreth\/Locksmith\/releases\/tag\/v2023.07\" data-type=\"link\" data-id=\"https:\/\/github.com\/jakehildreth\/Locksmith\/releases\/tag\/v2023.07\">released<\/a> by Jake Hildreth.<\/p>\n\n\n\n<p><strong>August 2023<\/strong>: <a href=\"https:\/\/specterops.io\/bloodhound-community-edition\/\" data-type=\"link\" data-id=\"https:\/\/specterops.io\/bloodhound-community-edition\/\">Bloodhound Community Edition (CE)<\/a> released.<\/p>\n\n\n\n<p><strong>October 2023<\/strong>: CrackMapExec continues as <a href=\"https:\/\/github.com\/Pennyw0rth\/NetExec\/releases\/tag\/v1.0.0\">NetExec<\/a> (nxc).<\/p>\n\n\n\n<p><strong>May 2025<\/strong>: <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/abusing-dmsa-for-privilege-escalation-in-active-directory\" data-type=\"link\" data-id=\"https:\/\/www.akamai.com\/blog\/security-research\/abusing-dmsa-for-privilege-escalation-in-active-directory\">BadSuccessor technique disclosed<\/a> which takes advantage of <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/delegated-managed-service-accounts\/delegated-managed-service-accounts-overview\" data-type=\"link\" data-id=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/delegated-managed-service-accounts\/delegated-managed-service-accounts-overview\">Delegated Managed Service Account (dMSA) <\/a>account weaknesses.<\/p>\n\n\n\n<p><strong>August 2025<\/strong>: <a href=\"https:\/\/specterops.io\/opengraph\/\" data-type=\"link\" data-id=\"https:\/\/specterops.io\/opengraph\/\">Bloodhound OpenGraph<\/a> released.<\/p>\n\n\n\n<p><strong>September 2025<\/strong>: Active Directory <a href=\"https:\/\/trustedsec.com\/blog\/detecting-password-spraying-with-a-honeypot-account\" data-type=\"link\" data-id=\"https:\/\/trustedsec.com\/blog\/detecting-password-spraying-with-a-honeypot-account\">password spraying detection published<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><em>Note: If you want to use content from this page, please credit Sean Metcalf and link back to this page.<\/em><br><br>That&#8217;s my list of notable techniques and tools. <br>If you have anything to add or update on the History of Active Directory Security, please email me: sean[@]adsecurity[dot]org.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the Summer of 2024, I had a talk at Troopers called &#8220;A Decade of Active Directory Attacks:What We&#8217;ve Learned &amp; What&#8217;s Next&#8221; (Slides &amp; Video) where I focused on the key milestones of Active Directory security (history). This article covers my &#8220;decade of Active Directory attacks&#8221; in some detail which was correlated with public &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=4706\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[565,2],"tags":[1512,1497,1518,1523,1498,1529,1173,1515,1509,1530,1522,1524,1525,1507,1516,598,1510,602,590,725,765,1508,1531,1464,601,673,1136,1526,1527,1514,1528,207,599,1501,1511,1503,1504,44,1521,1532,954,1506,232,696,1483,1519,1520,1032,1517,1513,1505,1499,1500,513,1502],"class_list":["post-4706","post","type-post","status-publish","format-standard","hentry","category-activedirectorysecurity","category-technical-reference","tag-aceupthesleeve","tag-activedirectorysecurityhistory","tag-adalanche","tag-adcsattacks","tag-adsecurityhistory","tag-badsuccessor","tag-bloodhound","tag-bloodhound-py","tag-bloodhoundce","tag-bloodhoungopengraph","tag-certifiedpre-owned","tag-certify","tag-certipy","tag-crackmapexec","tag-dcshadow","tag-dcsync","tag-dnsadmintodomainadmin","tag-dsinternals","tag-dsrm","tag-exploitinggrouppolicypreferences","tag-goldentickets","tag-groupmanagedserviceaccounts","tag-historyofactivedirectorysecurity","tag-honeypot","tag-impacket","tag-kerberoast","tag-kerberoasting","tag-kerberosrelay","tag-krbrelayup","tag-ldapdomaindump","tag-locksmith","tag-mimikatz","tag-mimikatzdcsync","tag-nbnspoof","tag-ntlmrelayx","tag-overpass-the-hash","tag-pass-the-ticket","tag-passthehash","tag-petitpotam","tag-pingcastle","tag-powershell-empire","tag-powershellattackdetection","tag-powersploit","tag-powerview","tag-printerbug","tag-purpleknight","tag-remotepotato","tag-responder","tag-rubeus","tag-sharphound","tag-silvertickets","tag-smbrelay","tag-smbrelay2","tag-wce","tag-windowscredentialeditor","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4706"}],"version-history":[{"count":33,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4706\/revisions"}],"predecessor-version":[{"id":4773,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4706\/revisions\/4773"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}