AD_Enumeration_Hunt – AD Pentesting Toolkit

Description Welcome to the AD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment. The scripts cover various aspects of AD enumeration, user and group management, computer enumeration, network and security analysis, and more. The toolkit is intended for […]

August 25, 2023
Read More >>

Ransomware dwell time hits new low

Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median dwell tim…

August 25, 2023
Read More >>

Hack The Box: Sekhmet Machine Walkthrough – Insane Difficulty

In this post, I would like to share a walkthrough of the Sekhmet Machine from Hack the Box This room will be considered an Insane machine on Hack the Box What will you gain from the Sekhmet machine? For the user flag, you will need to abuse the ExpressJS website which has been vulnerable to a […]

The post Hack The Box: Sekhmet Machine Walkthrough – Insane Difficulty appeared first on Threatninja.net.

April 1, 2023
Read More >>

PowerHuntShares : Audit Script Designed In Inventory, Analyze, And Report Excessive Privileges Configured On Active Directory Domains

PowerHuntShares is design to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers.It is intented to help IAM and other blue teams gain a better understand of their SMB Share attack surface and provides data insights to help naturally group related share to help stream line remediation […]

February 20, 2023
Read More >>

FarsightAD : PowerShell Script That Aim To Help Uncovering (Eventual) Persistence Mechanisms

FarsightAD is a PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise. The script produces CSV / JSON file exports of various objects and their attributes, enriched with timestamps from replication metadata. Additionally, if executed with replication privileges, the Directory Replication Service (DRS) […]

January 10, 2023
Read More >>