Active Directory Attacks
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill is centered on the unauthorized harvesting of sensitive domain credentials.
- Evidence: Provides commands for
secretsdump.pyto extract NTLM hashes from Domain Controllers andmimikatzfor DCSync attacks to retrieve thekrbtgthash. - Evidence: Includes techniques for Kerberoasting and AS-REP Roasting to obtain crackable ticket hashes.
- [COMMAND_EXECUTION] (HIGH): The skill facilitates lateral movement and unauthorized command execution on remote systems.
- Evidence: Provides instructions for using
psexec.py,wmiexec.py, andsmbexec.pyto execute commands with administrative privileges on remote targets using hashes or credentials. - [REMOTE_CODE_EXECUTION] (HIGH): The skill contains workflows for exploiting critical, wormable vulnerabilities to gain system-level access.
- Evidence: Instructions for CVE-2020-1472 (ZeroLogon) involve resetting machine account passwords to gain domain dominance.
- Evidence: Instructions for CVE-2021-1675 (PrintNightmare) involve the execution of a malicious remote DLL hosted on an attacker-controlled share.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata