Active Directory Reconnaissance: In-Depth Analysis of Attacker Techniques

Attackers leverage standard tools and legitimate privileges to conduct reconnaissance in Active Directory (AD). If undetected, this phase enables lateral movement and privilege escalation. This article dissects advanced commands used in real-world attacks and provides defensive countermeasures. 1. 🕵️ Attack Phase Breakdown: Key Reconnaissance Commands 1-1. Initial Information Gathering (Low-Privilege Context) # Domain Structure Discovery 🌐 nltest /dsgetdc:(DomainName) # Identify Domain Controllers Get-ADDomain | FL DNSRoot,DistinguishedName # Extract DNS Data # User/Group Enumeration 👥 net group "Domain Admins" /domain # List Privileged Group Members Get-ADUser -Filter * -Properties MemberOf | Where {$_.MemberOf -match "Admin"} # Extract Admin Accounts Attacker Objectives: Identify admin/service accounts, outdated password policies, and legacy systems. ...

April 26, 2025 · 3 min · 596 words · 0xuki

XSS Hunting: Risks of document.write and Detection Strategies

The document.write method in JavaScript remains a critical vector for Cross-Site Scripting (XSS) vulnerabilities. While it dynamically injects HTML content, improper handling of user input can enable attackers to execute arbitrary scripts. This article explores practical techniques to identify and mitigate risks associated with document.write, supported by real-world cases and defensive frameworks. 1. Why document.write Enables XSS Core Risks document.write directly renders unvalidated strings into HTML, creating vulnerabilities when: Untrusted input sources (URL parameters, form fields) are used without sanitization. Inadequate escaping allows characters like < or > to bypass defenses. Dynamic contexts (search results, error messages) amplify injection opportunities. Example: ...

April 24, 2025 · 3 min · 438 words · 0xuki