Do you scan your AD for attack paths?

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐˜€๐—ฐ๐—ฎ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฝ๐—ฎ๐˜๐—ต๐˜€? From my experience doing security assessments โ€” thereโ€™s ๐—ฎ๐—น๐˜„๐—ฎ๐˜†๐˜€ ๐—ฎ๐˜ ๐—น๐—ฒ๐—ฎ๐˜€๐˜ ๐—ผ๐—ป๐—ฒ ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฝ๐—ฎ๐˜๐—ต to Domain Admin. Always. And these donโ€™t come from one big misconfigurationโ€ฆ Theyโ€™re built from multiple small issues ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป๐—ฒ๐—ฑ ๐˜๐—ผ๐—ด๐—ฒ๐˜๐—ต๐—ฒ๐—ฟ. ๐—ช๐—ต๐˜† ๐˜€๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐˜†๐—ผ๐˜‚ ๐˜€๐—ฐ๐—ฎ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—”๐—— ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜†? ๐Ÿ›  […]

Final months for RC4

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—™๐—ถ๐—ป๐—ฎ๐—น ๐—บ๐—ผ๐—ป๐˜๐—ต๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ฅ๐—–๐Ÿฐ ๐—ถ๐—ป ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€? Microsoft is phasing out RC4 for Kerberos service tickets โ€” and the timeline is out. ๐—ข๐—ป ๐—๐—ฎ๐—ป ๐Ÿญ๐Ÿฏ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ, an update shipped that starts the journey toward stopping default issuance of ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐˜๐—ถ๐—ฐ๐—ธ๐—ฒ๐˜๐˜€ with legacy encryption (like RC4). Why? Because ๐—ฅ๐—–๐Ÿฐ can still be selected […]

Detection of Misconfigurations & Threats in AD

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜† ๐—ฐ๐—ต๐—ฒ๐—ฐ๐—ธ ๐˜†๐—ผ๐˜‚๐—ฟ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ณ๐—ผ๐—ฟ ๐—บ๐—ถ๐˜€๐—ฐ๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ๐—ฑ ๐—”๐—–๐—Ÿ๐˜€? ACL misconfigurations are one of the ๐—บ๐—ผ๐˜€๐˜ ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—น๐—ผ๐—ผ๐—ธ๐—ฒ๐—ฑ โ€” yet severe โ€” vulnerabilities in AD environments. They often stay hidden until a malicious actor finds themโ€ฆ and by then, itโ€™s too late. ๐—›๐—ฒ๐—ฟ๐—ฒ ๐—ฎ๐—ฟ๐—ฒ ๐—ท๐˜‚๐˜€๐˜ ๐—ฎ ๐—ณ๐—ฒ๐˜„ ๐—ฒ๐˜…๐—ฎ๐—บ๐—ฝ๐—น๐—ฒ๐˜€ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐˜€๐—ฒ: ๐Ÿ”น […]

Getting rid of NTLM is easier now

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—š๐—ฒ๐˜๐˜๐—ถ๐—ป๐—ด ๐—ฟ๐—ถ๐—ฑ ๐—ผ๐—ณ ๐—ก๐—ง๐—Ÿ๐—  ๐—ถ๐˜€ ๐—ณ๐—ถ๐—ป๐—ฎ๐—น๐—น๐˜† ๐—ฒ๐—ฎ๐˜€๐—ถ๐—ฒ๐—ฟ (๐—ฎ๐—ป๐—ฑ ๐˜€๐—บ๐—ฎ๐—ฟ๐˜๐—ฒ๐—ฟ) In Windows 11 version 24H2 and Windows Server 2025, Microsoft introduced ๐—ฒ๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ก๐—ง๐—Ÿ๐—  ๐—น๐—ผ๐—ด๐—ด๐—ถ๐—ป๐—ด โ€” and itโ€™s a game changer for organizations trying to decommission NTLM. Letโ€™s break it down ๐Ÿ‘‡ โธป ๐—ข๐—Ÿ๐—— ๐—ช๐—”๐—ฌ ๐Ÿ› ย ๐—š๐—ฃ๐—ข: โ€ข ๐˜š๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜š๐˜ฆ๐˜ต๐˜ต๐˜ช๐˜ฏ๐˜จ๐˜ด > ๐˜ˆ๐˜ฅ๐˜ท๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ˆ๐˜ถ๐˜ฅ๐˜ช๐˜ต ๐˜—๐˜ฐ๐˜ญ๐˜ช๐˜ค๐˜บ […]

Windows Server Core

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—›๐—ฎ๐˜๐—ฒ ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ฒ๐—ฟ ๐—–๐—ผ๐—ฟ๐—ฒ? ๐—›๐—ฒ๐—ฟ๐—ฒ’๐˜€ ๐—ช๐—ต๐˜† ๐—ฌ๐—ผ๐˜‚ ๐—ฆ๐—ต๐—ผ๐˜‚๐—น๐—ฑ ๐—”๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—จ๐˜€๐—ฒ ๐—œ๐˜ Windows Server Core is one of the ๐—บ๐—ผ๐˜€๐˜ ๐—บ๐—ถ๐˜€๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ผ๐—ผ๐—ฑ ๐—ฎ๐—ป๐—ฑ ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜‚๐˜€๐—ฒ๐—ฑ “tools” in the Windows ecosystem. ๐Ÿ–ฅ๏ธ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐—ถ๐˜? Itโ€™s Windows Server โ€” but ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—š๐—จ๐—œ. Just PowerShell, Command Line, and sconfig. And yes, it still supports critical […]

RDP Security Features

๐Ÿ”’ย Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐˜†๐—ผ๐˜‚ ๐˜‚๐˜€๐—ฒ ๐—ฅ๐——๐—ฃ ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐—ฟ๐—น๐˜† ๐—ถ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜? Then you should know there are more secure ways to do it. ๐—•๐˜† ๐—ฑ๐—ฒ๐—ณ๐—ฎ๐˜‚๐—น๐˜, your credentials are sent to the remote host during an RDP session โ€” which means if the machine is compromised, attackers can steal and reuse them. ๐—•๐˜‚๐˜ ๐˜๐—ต๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐—ด๐—ผ๐—ผ๐—ฑ ๐—ป๐—ฒ๐˜„๐˜€ […]

RDP Restricted Admin Mode

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐——๐—ผ ๐—ฌ๐—ผ๐˜‚ ๐—จ๐˜€๐—ฒ ๐—ฅ๐—ฒ๐˜€๐˜๐—ฟ๐—ถ๐—ฐ๐˜๐—ฒ๐—ฑ ๐—”๐—ฑ๐—บ๐—ถ๐—ป ๐— ๐—ผ๐—ฑ๐—ฒ ๐—ณ๐—ผ๐—ฟ ๐—ฅ๐——๐—ฃ? If not, you shouldโ€”it ๐—ฝ๐—ฟ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜๐˜€ ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐—ฒ๐˜…๐—ฝ๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ. ๐—ช๐—ต๐˜† ๐—œ๐˜ ๐—˜๐˜…๐—ถ๐˜€๐˜๐˜€: Restricted Admin Mode was designed to let administrators connect to a potentially compromised device without passing their credentials to it. You must already be an administrator on the target machine, but your credentials […]

Kerberos Enforce AES

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—ช๐—ฎ๐—ป๐˜ ๐˜๐—ผ ๐—ฑ๐—ถ๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฅ๐—–๐Ÿฐ ๐—ฎ๐—ป๐—ฑ ๐—ฒ๐—ป๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ฒ ๐—”๐—˜๐—ฆ ๐—ถ๐—ป ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐˜€? You should โ€” butย ๐—ฑ๐—ผ๐—ปโ€™๐˜ ๐—ฑ๐—ผ ๐—ถ๐˜ ๐—ฏ๐—น๐—ถ๐—ป๐—ฑ๐—น๐˜†. Enforcing strong authentication (like AES-only Kerberos) is an important part of ๐—บ๐—ผ๐—ฑ๐—ฒ๐—ฟ๐—ป ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—•๐—ฎ๐˜€๐—ฒ๐—น๐—ถ๐—ป๐—ฒ๐˜€ย โ€” just like LDAP signing or NTLM hardening. But in older environments,ย RC4 is still widely used, and flipping the switch ๐—ฐ๐—ฎ๐—ป ๐—ฏ๐—ฟ๐—ฒ๐—ฎ๐—ธ […]

Privileged Access Workstations (PAWs)

๐Ÿ”’ Secure Bits ๐Ÿ’ก Why should you use Privileged Access Workstations (PAWs)? Accessing your infrastructure through a basic user device leaves your privileged account credentials in the deviceโ€™s memory, and it is making you susceptible to keyloggers (software or hardware) that can capture these credentials. To mitigate this risk, implement PAWs in your environment and […]

Passwords in Group Policy

๐Ÿ”’ Secure Bits ๐Ÿ’ก ๐—”๐—ฟ๐—ฒ ๐—ฝ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ๐˜€ ๐—ต๐—ถ๐—ฑ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—š๐—ฟ๐—ผ๐˜‚๐—ฝ ๐—ฃ๐—ผ๐—น๐—ถ๐—ฐ๐—ถ๐—ฒ๐˜€? ๐—›๐—ผ๐˜„ ๐—ผ๐—น๐—ฑ is your Active Directory? Are you sure there’s no history of stored credentials? ๐Ÿšจ Before 2014, many admins used Group Policy Preferences (GPP) to ๐˜€๐—ฒ๐˜ ๐—ฝ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ๐˜€ for tasks, services, and other configurations. It was convenientโ€”but ๐—ฑ๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟ๐—ผ๐˜‚๐˜€๐—น๐˜† ๐—ถ๐—ป๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ. Microsoft patched this in 2014, […]