Active Directory Attack Resistance

Active Directory Security Assessment by certified experts

Check your Active Directory configuration for vulnerabilities

In any Active Directory environment, there is a complex, dynamic, and often difficult to navigate network of user permissions and objects. Attackers often exploit these relationships to gradually gain more and more privileges and eventually achieve their goal. In many Red Team assessments, the Active Directory environment is a key defensive vulnerability.

Our Active Directory Attack Resistance service is directly designed to test the most common issues of Active Directory installations, covering the top areas where we consistently find weaknesses: Enterprise AD configuration, the unprotected access to credentials, and the quality of the passwords used.

With an audit of the Active Directory for its attack resistance, attack paths are systematically identified and hardening potentials are worked out.

Compared to a Red Team Assessment, the AD attack resistance audit is very focused and takes significantly less time due to the significantly reduced complexity of the approach.

Typically, the following three components are checked:

Enterprise AD Configuration

. Due to the large number of groups, objects, organizational units, etc. found in a production Active Directory landscape, it is not uncommon to find unwanted combinations as well as obsolete accounts. By cleverly exploiting such combinations, it is often possible for attackers to extend privileges all the way up to the domain administrator. We identify such combinations so that they can be addressed accordingly and paths removed.

Unprotected access to credentials

. One of the most common vulnerabilities uncovered through the use of our Red Team is the internally free availability of credentials. Too often these are present, for example in administrative scripts, on unsecured network shares. In this test, we scan the network starting from a client or server for this and similar privileged information.

Quality of passwords used

. The technical enforcement of a minimum standard for password quality for both technical and non-technical users is an important component of the actual security of an environment. Nevertheless, these frameworks are often circumvented - sometimes for purely practical reasons, such as setting a temporary password during password reset and setting an initial password. To test the performance of your company's password management, we try to break as many passwords as possible and, in this context, we also analyze the relevant specifications for setting up and resetting passwords.

Why Redlings?

Porto Headers
A Trusted Partner

In-depth threat analysis and consultation

A deep understanding of how hackers work

In accordance with recognized rules of technology (BSI, PTES, PCI DSS, OSSTMM, NIST, OWASP)

Extensive report with recommendations to fix found vulnerabilities

Comprehensive post-test support for effective elimination of detected risks

.

Have we sparked your interest?

Just give us a call or write us a message!

Erfolgreich! We have received your request. Thank you very much.
Fehler! An error occurred while sending. Please use another way to contact us!

Ratgeber

We use cookies to improve user experience and analyze website traffic. Read about how we use cookies and how you can control them by clicking "Privacy Preferences".

Privacy Preferences I Agree

Privacy Preferences

When you visit any website, it may store or retrieve information through your browser, usually in the form of cookies. Since we respect your right to privacy, you can choose not to permit data collection from certain types of services. However, not allowing these services may impact your experience.