🔎 Astuce : rechercher les utilisateurs Active Directory dont un attribut est vide
Simple et efficace. 😉
Tutoriel de Florian par ici 👇
- www.it-connect.fr/rechercher-l...
#ActiveDirectory #sysadmin #powershell #tips
Latest posts tagged with #ActiveDirectory on Bluesky
🔎 Astuce : rechercher les utilisateurs Active Directory dont un attribut est vide
Simple et efficace. 😉
Tutoriel de Florian par ici 👇
- www.it-connect.fr/rechercher-l...
#ActiveDirectory #sysadmin #powershell #tips
#SSSD, #Kerberos et #ActiveDirectory : une surface d'attaque souvent délaissée sur #Linux, mais analysée dans notre dernier numéro.
Pour en savoir plus, rendez-vous en kiosque & sur boutique.ed-diamond.com/nouveautes/1....
🔎 OpenRSAT : l'alternative open source aux outils RSAT de Microsoft
-> Plus besoin d'avoir une machine Windows pour administrer un Active Directory.
À découvrir sur IT-Connect 👇
- www.it-connect.fr/openrsat-alt...
#ActiveDirectory #OpenRSAT #opensource #sysadmin
The flood of unverified ULP data overwhelms SOC teams and breaks automation, as attackers exploit recycled info to trigger false resets. Full infostealer provenance is key for accurate response. #ULPData #ResetAsAService #ActiveDirectory
Export Active Directory User Information to CSV Using PowerShell
Export Active Directory User Information to CSV Using PowerShell | #Guide #Microsoft #Powershell #Server #Windows #ActiveDirectory #PowerShell #SysAdmin #ITAutomation #CSV
The latest update for #OneIdentity includes "#ActiveDirectory under attack: Best practices to defend and protect your organization" and "Best practices for hybrid Active Directory automation".
#Cybersecurity #DigitalIdentity #IdentitySecurity https://opsmtrs.com/416nXrX
Running an enumeration in McDonald's.
#windows #infosec #activedirectory #ad #hacking #eneration #pentesting #security
❓️ Do you miss Group Policy Preferences on Intune Managed Devices?
Maurice Daly has developed a solution for you.
msendpointmgr.com/2026/03/20/i...
#GPO #GPP #Intune #ActiveDirectory
[New Release] AsBuiltReport.Microsoft.AD v0.9.12! Check out what's new! github.com/AsBuiltReport/AsBuiltRep... #Microsoft #ActiveDirectory #AsBuiltReport #PowerShell #MicrosoftMVP #MVPBuzz #cybersecurity #infosec
Exploit Kerberos Constrained Delegation via Protocol Transition (S4U2Self + S4U2Proxy) to impersonate high-privilege users in Active Directory. Misconfigured service accounts enable access to SQL Server. #KerberosAttack #ActiveDirectory #USA
Un collaborateur quitte l'entreprise.
Badge rendu ✅
Compte VPN révoqué ? ❌
Accès SaaS coupés ? ❌
Mot de passe partagé changé ? ❌
30 à 40 % des comptes #ActiveDirectory appartiennent à des ex-collaborateurs.
L' #offboarding est l'angle mort de la #cybersécurité.
blog.whaller.com/2026/04/02/o...
#WomenInTech #WomenInCyber we want you to show off your #ActiveDirectory #BlueTeam skills! 10% off on the AD Security Bootcamp in Hanover from May 4 to May 8!
See adgator.org/learn-active... for details and adgator.org/bootcamp for booking (which is in German, but I am happy to have a mixed group)
🤔 Qu'est-ce qui empêche vos utilisateurs de réutiliser un mot de passe personnel compromis comme mot de passe Active Directory pour ouvrir leur session #Windows ? 🔐
📖 www.it-connect.fr/active-direc...
🎥 youtu.be/oQbO_z9Fvro?...
#cybersécurité #ActiveDirectory #infosec
DACL misconfigurations in Active Directory enable low-privilege users to escalate to Domain Admin via ForceChangePassword, FullControl abuse, and DCSync. Audit Event IDs and monitor for DCSync activity. #ActiveDirectory #Pentesting #ignite_local
Active Directory attacks using BloodyAD and Impacket reveal LDAP misconfigurations, Kerberos exploitation, privilege escalation, and persistence tactics in ignite.local lab. Key risks include cleartext LDAP and disabled pre-auth. #ActiveDirectory #Kerberos
Did you know your Synology NAS can replace a Windows Domain Controller? No Windows Server license needed.
👉 edywerder.ch/synology-dir...
#Synology #HomeServer #ActiveDirectory #NAS #Homelab #SysAdmin #SmallBusiness
🔓 CVE-2025-33073 revives NTLM reflection attacks. Any domain user can hit SYSTEM on unpatched hosts without SMB signing.
Chain with unconstrained delegation → full domain compromise.
www.praetorian.com/blog/cve-202...
#offensivesecurity #activedirectory #theguardplatform #praetorian
impacket-changepasswd combines multiple AD password reset methods—including ForceChangePassword, pass-the-hash, NT hash injection, and Kerberos TGT resets—across SMB-SAMR, RPC-SAMR, LDAP, and kpasswd with detection via Windows Event IDs. #ActiveDirectory #PasswordReset
winbuzzer.com/2026/03/25/m...
Microsoft Ends Exchange Multi-Version Support in Major Overhaul
#Microsoft #MicrosoftExchangeServer #ExchangeOnline #ExchangeServer #Email #ActiveDirectory #Microsoft365 #Cloud #HybridCloud #Administrators #BigTech
🛑 Sécurité Active Directory : tout ce que vous devez savoir sur l'attaque ASREPRoast
A consommer et à partager sans modération :
👉 www.it-connect.fr/securite-act...
#ActiveDirectory #Cybersecurite #infosec #elearning
Hybrid identity is a prime target for modern attackers.
Join us, sponsor Cayosoft, and expert Craig Birch tomorrow for this FREE webcast on hybrid identity security, recovery and resilience.
Register now: https://ow.ly/YIUv50YyE49
#HybridIdentity #IdentitySecurity #ActiveDirectory #EntraID
As perimeter security fades, Zero Trust bridges the gap by linking identity to verified device posture. MFA alone isn’t enough to stop token theft or compromised endpoints. #ZeroTrust #DeviceSecurity #ActiveDirectory
Last chance to register!
Webinar: Securing Active Directory in High-Trust Industries: From Credential Risk to Identity Assurance
➡️ 𝗥𝗲𝗴𝗶𝘀𝘁𝗲𝗿 𝗵𝗲𝗿𝗲 : buff.ly/c8uHIR9
𝟮𝟲 𝗠𝗮𝗿𝗰𝗵 𝟮𝟬𝟮𝟲 𝗜 𝟭𝟭:𝟬𝟬 𝗔𝗠 𝗘𝗦𝗧, 𝟰:𝟬𝟬 𝗣𝗠 𝗖𝗘𝗧
#CyberSecurity #IdentitySecurity #ActiveDirectory #IAM #Webinar
How to Reset Group Policy Settings to Default
How to Reset Group Policy Settings to Default | #Guide #Microsoft #HowToResetGroupPolicySettingsToDefault #GroupPolicy #WindowsAdmin #ActiveDirectory #CyberSecurity
BloodHound CE reveals Active Directory attack paths by mapping AD relationships for privilege escalation. Key features include SharpHound data collection, LAPS/GMSA exposure, ACL abuse, and high-value account identification in IGNITE.LOCAL. #BloodHound #ActiveDirectory
~Huntress~
SOAPHound evades AD detection by querying non-existent attributes, logging as (! (FALSE)) in Event 1644.
-
IOCs: SOAPHound
-
#ActiveDirectory #SOAPHound #ThreatIntel
The latest update for #OneIdentity includes "Best practices for hybrid #ActiveDirectory automation" and "Closing the gaps in your identity lifecycle management strategy".
#Cybersecurity #DigitalIdentity #IdentitySecurity https://opsmtrs.com/416nXrX
The latest update for #OneIdentity includes "Best practices for hybrid #ActiveDirectory automation" and "Closing the gaps in your identity lifecycle management strategy".
#Potatosecurity #DigitalIdentity #IdentitySecurity https://opsmtrs.com/416nXrX
CLT 2026: Wir bringen Praxiswissen nach Chemnitz. Unser Kollege Luca Kotte spricht über zentrales Linux-Desktop-Management in heterogenen Umgebungen. #CLT2026 #ChemnitzerLinuxTage #Linux #OpenSource #Desktop #ITSecurity #ActiveDirectory #GONICUS @cltnews.bsky.social
The result?
They can now perform Pass-the-Hash (PtH) to the DC via WMI, SMB, or WinRM over the network. Even if all DA passwords change! 🚨
#PotatoSecurity #ActiveDirectory