Active Directory vs. Azure AD (and Other Identity Providers)
This article will look at Active Directory (AD), Azure Active… Continue reading Active Directory vs. Azure AD (and Other Identity Providers)
Collaborate Disseminate
This article will look at Active Directory (AD), Azure Active… Continue reading Active Directory vs. Azure AD (and Other Identity Providers)
In this interview with Help Net Security, Lori Österholm, CTO at Specops Software, explains what makes passwords vulnerable and suggests some password best practices and policies organizations should implement to keep their systems secure. There’… Continue reading Good end user passwords begin with a well-enforced password policy
Apple is phasing out its macOS Server application that was… Continue reading Apple Finally Discontinues Support for macOS Server App
Microsoft has released updated guidance to help enterprise customers protect… Continue reading Microsoft Issues New Guidance on Securing Domain Controllers
Installing Active Directory domain controllers in a virtual machine (VM)… Continue reading Best Practices for Installing Active Directory Domain Controllers in a Virtual Machine
Microsoft has detailed its latest efforts to tackle cyber attacks… Continue reading Microsoft Details Efforts to Fight Russian Cyber Attacks Targeting Ukraine
In kerberoasting , User request service ticket for any service with registered SPN then use the ticket to crack service password.
But in kerberoses authentication process , KRB_TGS_REQ request is encrypted with TGS secret key which is held… Continue reading TGS Ticket in Kerberoasting
Is it possible, with NT Authority/SYSTEM access, to reuse mscash2 credentials in any way on a local system or AD network? Perhaps with runas /savecred or mimikatz or something similar? I know that the mscash2 cannot be passed in a traditio… Continue reading Abusing Saved mscash2 Credentials in Active Directory
I am trying to figure out the source of Non-Interactive logon failure on my AD. I’m getting a huge number of login failure events on an AD auditing tool but I’m not sure how to figure out the source of these events. Can someone please assi… Continue reading Source of Non-Interactive login in active directory [closed]
Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the protection of corporate infrastructure. It is no secret that just one vulnerable, u… Continue reading The security gaps that can be exposed by cybersecurity asset management