The Blog

Identity Security & Active Directory

Practical writing from real IR work โ€” proactive hardening, reactive response, and everything in between. No vendor angles, no theoretical frameworks.

๐Ÿฉธ

BloodHound for Defenders: Using Attack Path Analysis to Find Your AD Gaps

How to run BloodHound proactively, write Cypher queries that surface real exposure, and translate graph data into a prioritized remediation backlog.

๐Ÿ”ฅ

Post-Compromise AD Recovery: The Eviction Playbook Nobody Gives You

The first 48 hours of AD eviction. Decisions that determine whether you succeed or give the attacker a persistent foothold โ€” what the documentation leaves out.

๐Ÿ”—

Hybrid Identity Attack Surface: Where On-Prem AD and Entra ID Create Unexpected Risk

AD Connect sync, Pass-Through Authentication, seamless SSO โ€” each one is a bridge. Most defenders don't understand the risk until an incident makes it obvious.

๐ŸŽฏ

AdminSDHolder, SDProp, and Protected Users: The AD Controls Nobody Configures Right

Built-in AD mechanisms designed to protect privileged accounts โ€” routinely misconfigured, occasionally abused, and almost always misunderstood.

๐Ÿ“ก

The Event IDs That Actually Matter for Identity Threat Detection

4624, 4768, 4769, 4771, 4776 โ€” and about a dozen others. A practical guide to the Windows event logs that reveal Kerberoasting, AS-REP roasting, lateral movement, and DCSync in progress.

๐Ÿ’€

Anatomy of a Domain Compromise: From Initial Access to Domain Admin

A walk-through of a real intrusion pattern โ€” credential theft, lateral movement, Kerberoasting, and DCSync. Sanitized, but this is what it actually looks like from the IR side.

๐Ÿ”‘

LAPS, PAWs, and JIT: The Privileged Access Controls That Actually Reduce Risk

Privileged access management without the enterprise price tag. What actually works, in plain terms, with implementation notes from real deployments.

๐Ÿงฉ

Entra ID Conditional Access: The Policies That Actually Reduce Identity Risk

Conditional Access is powerful and frequently misconfigured. The policies worth enabling, the gaps that leave accounts exposed, and how to test without locking yourself out.