Do you scan your AD for attack paths?

๐Ÿ”’ Secure Bits ๐Ÿ’ก
๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐˜€๐—ฐ๐—ฎ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฝ๐—ฎ๐˜๐—ต๐˜€?

From my experience doing security assessments โ€” thereโ€™s ๐—ฎ๐—น๐˜„๐—ฎ๐˜†๐˜€ ๐—ฎ๐˜ ๐—น๐—ฒ๐—ฎ๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฝ๐—ฎ๐˜๐—ต to Domain Admin. Always.
And these donโ€™t come from one big misconfigurationโ€ฆ Theyโ€™re built from multiple small issues ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป๐—ฒ๐—ฑ ๐˜๐—ผ๐—ด๐—ฒ๐˜๐—ต๐—ฒ๐—ฟ.

๐—ช๐—ต๐˜† ๐˜€๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐˜†๐—ผ๐˜‚ ๐˜€๐—ฐ๐—ฎ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—”๐—— ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜†?
๐Ÿ›  It gives you a clear picture of your current security posture.
๐Ÿ“ˆ Itโ€™s a great way to validate improvements after implementing things like the Tiering Model or other AD hardening efforts.

๐—›๐—ผ๐˜„ ๐—ฑ๐—ผ๐—ฒ๐˜€ ๐—ถ๐˜ ๐˜„๐—ผ๐—ฟ๐—ธ?
The scanner collects data from your AD (and optionally endpoints), then maps ๐—ฟ๐—ฒ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€๐—ต๐—ถ๐—ฝ๐˜€ โ€” logons, permissions, delegations, group memberships โ€” to identify escalation chains.

๐—™๐—ผ๐—ฟ ๐—ฒ๐˜…๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ:
๐Ÿ”ธ Account T2-dhorak is logged into AD-WK02, where any user can log in.
๐Ÿ”ธ That account can access AD-UTIL01, where a widely-used ITService account is also logged in.
๐Ÿ”ธ That ITService account can reset passwords for Tier 0 accountsโ€ฆ
๐Ÿ”ธ Which leads directly to ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป.

Classic type of an ๐—ฒ๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฝ๐—ฎ๐˜๐—ต when Tiering Model is not implemented. Easy to miss manually. Easy to ๐˜ƒ๐—ถ๐˜€๐˜‚๐—ฎ๐—น๐—ถ๐˜‡๐—ฒ with a good tool.

๐Ÿ”ฅ Thatโ€™s why I started collaborating with Forestall and their tool ๐—™๐—ผ๐—ฟ๐—ฒ๐˜€๐˜๐—ฎ๐—น๐—น ๐—œ๐—ฆ๐—ฃ๐— .

Iโ€™ve tested it over the last few weeks and ๐—ฐ๐—ฎ๐—ป ๐—ฑ๐—ฒ๐—ณ๐—ถ๐—ป๐—ถ๐˜๐—ฒ๐—น๐˜† ๐—ฟ๐—ฒ๐—ฐ๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐—ฑ it โ€” especially their Tier 0 analysis feature. It not only ๐—ฐ๐—ผ๐—ป๐˜๐—ถ๐—ป๐˜‚๐—ผ๐˜‚๐˜€๐—น๐˜† scans for misconfigurations โ€” but shows you how they connect in the form of ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฝ๐—ฎ๐˜๐—ต๐˜€.

๐Ÿงช ๐—ช๐—ฎ๐—ป๐˜ ๐˜๐—ผ ๐˜๐—ฟ๐˜† ๐—ถ๐˜?
Thanks to this collaboration, you can test it for free – just let me know, and I will make it happen. Let me know what you think โ€” and I might even be able to get a discount for you.