How to find insecure permissions in 3 easy steps. 1. Download ADeleg & ADeleginator 2. Run Invoke-ADeleginator 3. Review the report Identifying what could be a full domain compromise attack path is that simple. Link to ADeleg/ADeleginator & other AD security resources here 👇 https://lnkd.in/eSgtpCqp
Just ran ADeleg on a customer engagement on friday. Gonna check out your wrapper in the lab on monday 💪🏽
Sweet. I need to try this in my home lab! Thanks for sharing.
CEO, Velocity Incident Response LLC | NYS Service-Disabled Veteran-Owned Business | Cybersecurity Public Speaker | Incident Commander | Ransomware Negotiator | Digital Forensic Examiner | | Army Veteran
1wGreat tool Spencer. I also really love the insight that BloodHound can give around identifying overly permissive accounts.