Active Directory Attacks

Fail

Audited by Socket on Feb 21, 2026

20 alerts found:

Securityx4Obfuscated Filex7Malwarex9
SecurityMEDIUM
sub-skills/as-rep-roasting.md

This fragment is an operational recipe for AS-REP Roasting — a credential harvesting technique targeting accounts configured without Kerberos preauthentication. It is high-risk when used without authorization because it produces offline-crackable artifacts that can lead to account compromise if passwords are weak. The snippet itself is not obfuscated code and contains no embedded malware, but it documents a clear malicious toolchain and should be treated as sensitive offensive guidance. Defenders should ensure Kerberos preauthentication is required for accounts, monitor AS-REQ/AS-REP request patterns to KDCs, and protect accounts with strong, non-dictionary passwords and multi-factor authentication.

Confidence: 75%Severity: 90%
Obfuscated FileHIGH
sub-skills/pass-the-hash.md

The fragment is an explicit, actionable demonstration of Pass-the-Hash authentication using Impacket and CrackMapExec. It contains no hidden obfuscation or embedded malware in itself, but it is offensive operational guidance that, if executed without authorization, leads to high-impact unauthorized access and remote code execution on Windows hosts. Treat these command patterns as high-risk TTP indicators; verify authorization before execution and monitor for similar usage in your environment.

Confidence: 98%
Obfuscated FileHIGH
sub-skills/samaccountname-spoofing-cve-2021-4227842287.md

This document is a high-risk offensive Active Directory playbook: it documents and automates methods for credential theft, Kerberos abuse (including samAccountName spoofing and Golden Tickets), and lateral movement. The text itself is not an obfuscated malware binary, but it explicitly instructs use of powerful post-exploitation tools that lead to domain compromise if executed. It should only be used in isolated, authorized test environments with explicit approvals and monitoring; running these commands against production or without authorization is dangerous and may be illegal.

Confidence: 98%
SecurityMEDIUM
sub-skills/step-2-ad-reconnaissance-with-bloodhound.md

These commands are legitimate red-team/blue-team AD reconnaissance operations but are high-risk if executed without explicit authorization. The fragment contains insecure examples (plaintext credentials on CLI) and shows actions that, in adversarial hands, directly support post-compromise discovery and lateral movement. Treat documentation or packages containing these instructions as sensitive; do not run them on production or unapproved networks and avoid passing credentials on command lines.

Confidence: 75%Severity: 80%
MalwareHIGH
sub-skills/esc8-web-enrollment-relay.md

The provided fragment demonstrates an offensive NTLM relay workflow aimed at compromising ADCS to enroll certificates, enabling potential lateral movement or domain compromise. It aligns with supply-chain/enterprise attack tooling usage rather than benign library behavior. Use should be restricted to authorized red-team/blue-team exercises with proper approvals; otherwise, it represents a high-risk capability that could lead to unauthorized certificate issuance.

Confidence: 63%Severity: 85%
MalwareHIGH
sub-skills/example-1-domain-compromise-via-kerberoasting.md

This fragment is a clear Kerberoasting attack playbook: enumerate SPNs, dump TGS hashes to disk, crack them offline with hashcat, and reuse cracked service-account credentials via psexec to gain remote access. It constitutes operational offensive guidance that enables credential theft and lateral movement. Treat as malicious activity unless found in an authorized red-team or defensive testing context. Mitigations include monitoring for SPN enumeration and TGS requests, protecting service-account passwords with strong unpredictable secrets, restricting read access to Kerberos ticket-granting endpoints, and detecting use of tools like GetUserSPNs.py, hashcat, and psexec in your environment.

Confidence: 90%Severity: 95%
MalwareHIGH
references/advanced-attacks.md

This document is a high-risk offensive playbook providing actionable instructions and commands to perform Active Directory attacks, credential theft, ticket forging, and enterprise deployment of malware via GPO/SCCM/WSUS/ADCS/ADFS. It contains explicit examples that create backdoor accounts and deploy payloads, as well as instructions to harvest and misuse highly sensitive secrets. Treat as malicious/hostile content: inclusion in a package or repository poses a severe security risk and should be removed or restricted to authorized red-team usage only.

Confidence: 90%Severity: 95%
Obfuscated FileHIGH
sub-skills/step-3-powerview-enumeration.md

The snippet is a PowerView-based Active Directory reconnaissance sequence that enumerates domain topology, users, groups (notably Domain Admins), password metadata, local admin reachability, and logged-on sessions. It is a dual-use offensive toolkit: benign in authorized audits but high-risk if run without authorization. The code enables follow-on actions (credential harvesting, lateral movement, privilege escalation) though it does not directly perform exploitation or exfiltration in this fragment.

Confidence: 98%
MalwareHIGH
sub-skills/printnightmare-cve-2021-1675.md

This fragment is a concise, weaponized exploitation recipe for PrintNightmare (CVE-2021-1675). It documents reconnaissance (rpcdump.py) and an authenticated exploitation step that forces a target to load an attacker-hosted DLL. The content is malicious in intent and facilitates remote code execution on vulnerable Windows hosts; it should only be present and used in authorized, controlled testing environments. Treat as high-risk and do not reuse in production or without explicit permission.

Confidence: 85%Severity: 95%
Obfuscated FileHIGH
sub-skills/silver-ticket.md

This snippet is an explicit instruction to forge a Kerberos service ticket and inject it into the local session using Mimikatz, enabling account impersonation and unauthorized access to domain resources. Inclusion in general-purpose code or documentation is high-risk and should be removed or clearly restricted to authorized red-team/learning contexts. If present in a repository, investigate author intent, search for any replaced real secrets, and audit for additional offensive tooling or credential material.

Confidence: 98%
SecurityMEDIUM
sub-skills/overpass-the-hash.md

The snippet documents a legitimate attack technique (NTLM overpass-the-hash / pass-the-ticket) with concrete commands to obtain and inject Kerberos tickets. While instructional, it enables credential reuse and unauthorized access if misused. From a supply-chain/security perspective, this represents high-risk guidance that could be abused if published in a public package. It should be treated as a potential abuse vector in the wild and subjected to strict policy review and monitoring in environments where such tooling could be executed.

Confidence: 63%Severity: 90%
MalwareHIGH
sub-skills/dcsync-attack.md

The provided content comprises explicit, high-risk attack techniques for credential dumping from a Windows domain controller. While instructional for defensive or offensive security contexts, it represents actionable abuse in real environments and warrants strong caution. It should be clearly restricted to authorized security testing with safeguards, and accompanied by mitigations, detection guidance, and governance controls to prevent misuse in production packages.

Confidence: 65%Severity: 85%
MalwareHIGH
sub-skills/example-2-ntlm-relay-to-ldap.md

This fragment is an explicit, actionable offensive guide for performing NTLM relay attacks against LDAP to create machine accounts and enable RBCD-style privilege escalation. It contains plaintext credential examples and bypass guidance for common defenses, making it high-risk if used outside authorized testing. Treat as malicious/offensive content: do not execute these commands on systems you do not own or have explicit, written authorization to test. Review and block use of these tools in environments where misuse could occur; implement mitigations such as SMB signing, LDAP channel binding, strong delegation controls, monitoring for atypical machine account creation, and restricting the ability to set msDS-AllowedToActOnBehalfOfOtherIdentity.

Confidence: 90%Severity: 95%
MalwareHIGH
sub-skills/esc1-misconfigured-templates.md

This is an explicit exploit sequence (AD CS ESC1 misconfigured template) that provides a clear, actionable path to obtain a certificate for an administrative account and use it to authenticate to a domain controller. It represents high-risk, offensive behavior (privilege escalation and domain compromise). Immediate mitigations: block or monitor certipy and unusual certificate enrollment activity; review and remediate CA template permissions (restrict enroll/auto-enroll to proper groups); search for and revoke unexpected certificates (including administrator.pfx), rotate exposed credentials, audit process command histories and logs for usage of CLI passwords, and tighten CA/AD logging and alerting.

Confidence: 75%Severity: 90%
Obfuscated FileHIGH
sub-skills/password-spraying.md

The fragment is an explicit demonstration of password-spraying activity using known offensive tools against a specified Active Directory domain controller. It contains clear malicious operational intent (hardcoded weak password, continued attempts after success, targeting DC) but is not itself obfuscated malware code; the primary danger is misuse leading to account compromise, log generation, and potential persistence by an attacker. Treat these commands as high operational risk and detect/mitigate accordingly.

Confidence: 98%
SecurityMEDIUM
SKILL.md

This skill is an explicit offensive playbook for compromising Active Directory environments. While it appears framed for red-team or penetration testing use, it contains detailed, powerful instructions and enumerates tools and outputs (credential harvesting, domain admin compromise, persistent access) that are highly likely to be abused for unauthorized attacks. The file itself is documentation rather than executable malware, but the capabilities it documents are dangerous and disproportionate without strict authorization, auditing, and controlled distribution. Treat as high-risk content intended for offensive operations; restrict to authorized red-team contexts with governance.

Confidence: 90%Severity: 90%
Obfuscated FileHIGH
sub-skills/responder-ntlmrelayx.md

This fragment is an explicit offensive operation to capture and relay NTLM authentication (via Responder) and to use those captured credentials against targets (via ntlmrelayx), including relaying to a domain controller to abuse delegation and escalate privileges. The commands should be treated as high-risk: they enable credential theft, lateral movement, and privilege escalation. Use only in authorized, isolated testing environments; do not run against production or unconsenting networks.

Confidence: 98%
Obfuscated FileHIGH
sub-skills/zerologon-cve-2020-1472.md

This snippet is an explicit exploit recipe for CVE-2020-1472 (ZeroLogon): it instructs an operator how to detect the vulnerability, exploit a domain controller, extract NTLM credential material, and optionally restore a machine account password. It constitutes high-risk offensive guidance and should not be executed against systems without explicit authorization. Review and patch affected domain controllers and monitor for use of these tools in your environment.

Confidence: 98%
MalwareHIGH
sub-skills/pass-the-ticket-golden-ticket.md

This fragment is direct operational guidance to create and use Kerberos Golden Tickets — a high-severity post-exploitation technique enabling domain-wide persistence and lateral movement. The commands are actionable and used by attackers and red teams. Treat this as malicious operational content: investigate for signs of compromise, restrict and monitor rights that enable DCSync, detect Mimikatz/Impacket usage and LSASS injection, and rotate krbtgt credentials if compromise is suspected.

Confidence: 75%Severity: 95%
MalwareHIGH
sub-skills/kerberoasting.md

The provided commands are explicit Kerberoasting instructions that facilitate extraction of service account TGS hashes and offline cracking to recover plaintext credentials. This is high-risk offensive guidance: it enables credential theft and lateral movement if executed against a target environment without authorization. Treat this content as potentially malicious; do not execute on systems you do not own or have explicit permission to test. Remove or label such examples with clear legal/authorization warnings and defensive guidance if they must remain in public repos.

Confidence: 90%Severity: 95%
Audit Metadata
Analyzed At
Feb 21, 2026, 10:34 AM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Factive-directory-attacks%2F@c83c1ba8edd35dbe13daf378ca2bc812b2423960