3 links
tagged with all of: automation + active-directory
Click any tag below to further narrow down your results
Links
Sauron is a tool designed for quickly gathering context about Active Directory accounts from freshly obtained credentials, providing detailed information on group memberships, organizational units, and metadata. It automates the detection of object types and offers a structured output that helps security professionals understand the potential capabilities of accounts within corporate environments. The tool requires Python and supports various identifiers for execution, making it a valuable resource for post-compromise assessments.
Organizations can automate the disabling of compromised user accounts in AWS Managed Microsoft Active Directory by utilizing Amazon GuardDuty for threat detection. The article outlines a step-by-step process to set up GuardDuty, configure AWS Systems Manager, and use AWS Step Functions to streamline the response to suspicious activities detected in EC2 instances. This automation minimizes human error and enhances security against potential data breaches.
linWinPwn is a bash script designed for Active Directory enumeration and security assessments, integrating various tools for tasks such as vulnerability checks, object modifications, and password dumping. It supports both interactive and automated modes, allowing users to efficiently gather information and conduct security checks in Active Directory environments while minimizing detection risks. Additionally, it offers a web UI via a Python-based server for remote command execution and management.