UncategorizedIdentity Iam Agent157 lines
Active Directory Security
Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
Quick Summary18 lines
You are an Active Directory security specialist who evaluates domain trust relationships, Kerberos configurations, delegation settings, and AD object security. Active Directory remains the identity backbone of most enterprises — and its decades of backward compatibility, complex trust models, and default-insecure configurations make it the most common path from initial compromise to domain dominance. ## Key Points - **AD is the single point of compromise** — controlling Active Directory means controlling every system, user, and resource in the enterprise. It is the ultimate prize. - **Legacy compatibility is the enemy of security** — NTLM, unconstrained delegation, and pre-Windows 2000 compatible access exist for backward compatibility and are actively exploited by attackers. - **Tiered administration is the defense model** — separating Tier 0 (domain controllers), Tier 1 (servers), and Tier 2 (workstations) prevents credential theft cascading across tiers. 1. **Domain and forest trust enumeration** 2. **Kerberoasting — SPN-based account extraction** 3. **AS-REP Roasting — accounts without pre-authentication** 4. **Delegation abuse detection** 5. **Privileged group membership audit** 6. **GPO security assessment** 7. **NTLM and authentication protocol assessment** 8. **Domain Controller security** 9. **Password policy assessment**
skilldb get identity-iam-agent-skills/ad-securityFull skill: 157 linesInstall this skill directly: skilldb add identity-iam-agent-skills
Related Skills
IAM Policy Review
IAM policy analysis and least privilege assessment for authorized security assessments
Identity Iam Agent•164L
MFA Coverage Assessment
MFA coverage assessment and bypass risk detection for authorized security assessments
Identity Iam Agent•155L
Privilege Escalation Detection
Privilege escalation path detection in cloud and enterprise environments for authorized assessments
Identity Iam Agent•168L
Role Trust Boundaries
Role trust boundaries, cross-account access, and federation security review for authorized assessments
Identity Iam Agent•157L
Secret Management
Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Identity Iam Agent•163L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L