Gathering User Data in Windows Networks: Exploring Active Directory Without Privileges

Date: 28/07/2025

Imagine someone launching an attack on a corporate Windows network. Initially, the attacker either has limited privileges in the domain or none at all. Therefore, they will search for accounts and services without elevated privileges, meaning not as a domain or local administrator. We will discuss how reconnaissance is conducted in an Active Directory environment.
Read full article →


Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain Attacks

Date: 27/07/2025

To successfully attack Active Directory, compromise workstations, and move through a network, a skilled hacker doesn’t necessarily need user credentials. However, sometimes they are indispensable. To obtain these credentials, it’s important to know where passwords are typically stored in networks using Active Directory and how to extract them.
Read full article →


Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection Strategies

Date: 23/07/2025

Over the past four years, no Black Hat or DEF CON conference has been complete without presentations on attacking Microsoft Active Directory. Participants discuss new attack vectors and their innovations, while also providing advice on how to detect and prevent them. In this article, we’ll explore popular methods of attacking AD and offer recommendations to help protect against them.
Read full article →