Shadow Admins are the privilege paths you’re not watching. These accounts don’t belong to Domain Admins, but they can take over your environment anyway — thanks to ACL misconfigurations, GPO access, or SIDHistory abuse. If you're only auditing group membership, you're already exposed.
Tag: Powershell
Kerberoasting: How It Works, How to Defend, and How to Minimize the Damage
Learn how Kerberoasting exploits Kerberos authentication in Active Directory, how it works, and what steps you can take to defend against it.
Windows Domain Name Service Remote Code Execution Vulnerability (CVE-2025-24064)
CVE-2025-24064 of March 11, 2025 highlights the possibility of executing malicious code on the network by exploiting the Use After Free vulnerability in the DNS server. The vulnerability shows the importance of allowing DNS updates only from trusted devices and therefore having only secure updates, preventing unrecognized devices from updating or adding their A record … Continue reading Windows Domain Name Service Remote Code Execution Vulnerability (CVE-2025-24064)
Step-by-Step C# PowerShell Module Creation in Visual Code
Prerequisites You need to have at least the next tools: Visual Studio Code .NET Framework Developer Pack 4.7.2 PowerShell 5.1 Create a Class Library Project in the .NET Framework The first step is to create a Class Library in the .NET Framework 4.7.2, compatible with PowerShell 5.1 generating the MyPowerShellModule.csproj file. Open a PowerShell terminal … Continue reading Step-by-Step C# PowerShell Module Creation in Visual Code



