Spencer Alessi’s Post

View profile for Spencer Alessi

Ethical Threat - Microsoft MVP - Pentester @SecurIT360 | Sysadmin roots. Hacker mindset. Defender mission. | Free weekly security tips 👇

How to find insecure permissions in 3 easy steps. 1. Download ADeleg & ADeleginator 2. Run Invoke-ADeleginator 3. Review the report Identifying what could be a full domain compromise attack path is that simple. Link to ADeleg/ADeleginator & other AD security resources here 👇 https://lnkd.in/eSgtpCqp

Chris K.

CEO, Velocity Incident Response LLC | NYS Service-Disabled Veteran-Owned Business | Cybersecurity Public Speaker | Incident Commander | Ransomware Negotiator | Digital Forensic Examiner | | Army Veteran

1w

Great tool Spencer. I also really love the insight that BloodHound can give around identifying overly permissive accounts.

Benjamin I.

Freelance IT-Security Consultant | OSCP & OSCP+ | PNPT | CEH (Master) | THM PT1 | eJPTv2 | CISSP in progress | I help companies to reduce their cybersecurity risk. Ask me how. Freelancer - #gerneperdu

1w

Just ran ADeleg on a customer engagement on friday. Gonna check out your wrapper in the lab on monday 💪🏽

Emperuman V.

Cyber Security Professional in a world of DFIR

1w

Sweet. I need to try this in my home lab! Thanks for sharing.

See more comments

To view or add a comment, sign in

Explore content categories