๐ Secure Bits ๐ก
๐๐ผ ๐๐ผ๐ ๐๐ฐ๐ฎ๐ป ๐๐ผ๐๐ฟ ๐๐ฐ๐๐ถ๐๐ฒ ๐๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐ ๐ณ๐ผ๐ฟ ๐ฎ๐๐๐ฎ๐ฐ๐ธ ๐ฝ๐ฎ๐๐ต๐?
From my experience doing security assessments โ thereโs ๐ฎ๐น๐๐ฎ๐๐ ๐ฎ๐ ๐น๐ฒ๐ฎ๐๐ ๐ผ๐ป๐ฒ ๐ฎ๐๐๐ฎ๐ฐ๐ธ ๐ฝ๐ฎ๐๐ต to Domain Admin. Always.
And these donโt come from one big misconfigurationโฆ Theyโre built from multiple small issues ๐ฐ๐ต๐ฎ๐ถ๐ป๐ฒ๐ฑ ๐๐ผ๐ด๐ฒ๐๐ต๐ฒ๐ฟ.
๐ช๐ต๐ ๐๐ต๐ผ๐๐น๐ฑ ๐๐ผ๐ ๐๐ฐ๐ฎ๐ป ๐๐ผ๐๐ฟ ๐๐ ๐ฟ๐ฒ๐ด๐๐น๐ฎ๐ฟ๐น๐?
๐ It gives you a clear picture of your current security posture.
๐ Itโs a great way to validate improvements after implementing things like the Tiering Model or other AD hardening efforts.
๐๐ผ๐ ๐ฑ๐ผ๐ฒ๐ ๐ถ๐ ๐๐ผ๐ฟ๐ธ?
The scanner collects data from your AD (and optionally endpoints), then maps ๐ฟ๐ฒ๐น๐ฎ๐๐ถ๐ผ๐ป๐๐ต๐ถ๐ฝ๐ โ logons, permissions, delegations, group memberships โ to identify escalation chains.
๐๐ผ๐ฟ ๐ฒ๐
๐ฎ๐บ๐ฝ๐น๐ฒ:
๐ธ Account T2-dhorak is logged into AD-WK02, where any user can log in.
๐ธ That account can access AD-UTIL01, where a widely-used ITService account is also logged in.
๐ธ That ITService account can reset passwords for Tier 0 accountsโฆ
๐ธ Which leads directly to ๐๐ผ๐บ๐ฎ๐ถ๐ป ๐๐ฑ๐บ๐ถ๐ป.
Classic type of an ๐ฒ๐๐ฐ๐ฎ๐น๐ฎ๐๐ถ๐ผ๐ป ๐ฝ๐ฎ๐๐ต when Tiering Model is not implemented. Easy to miss manually. Easy to ๐๐ถ๐๐๐ฎ๐น๐ถ๐๐ฒ with a good tool.
๐ฅ Thatโs why I started collaborating with Forestall and their tool ๐๐ผ๐ฟ๐ฒ๐๐๐ฎ๐น๐น ๐๐ฆ๐ฃ๐ .
Iโve tested it over the last few weeks and ๐ฐ๐ฎ๐ป ๐ฑ๐ฒ๐ณ๐ถ๐ป๐ถ๐๐ฒ๐น๐ ๐ฟ๐ฒ๐ฐ๐ผ๐บ๐บ๐ฒ๐ป๐ฑ it โ especially their Tier 0 analysis feature. It not only ๐ฐ๐ผ๐ป๐๐ถ๐ป๐๐ผ๐๐๐น๐ scans for misconfigurations โ but shows you how they connect in the form of ๐ฎ๐๐๐ฎ๐ฐ๐ธ ๐ฝ๐ฎ๐๐ต๐.
๐งช ๐ช๐ฎ๐ป๐ ๐๐ผ ๐๐ฟ๐ ๐ถ๐?
Thanks to this collaboration, you can test it for free – just let me know, and I will make it happen. Let me know what you think โ and I might even be able to get a discount for you.
