Attivo Networks Blogs

Attackers want Active Directory privileges. Here’s how to stop them

SC Magazine

A growing number of threat actors use advanced persistent threat (APT) tactics to progress their attacks. More and more target Active Directory (AD), domain controllers, and flaws in Kerberos tickets to find weaknesses, steal credentials, and escalate privileges. By gathering this information, attackers can gain what they need to establish a foothold, move laterally through the network without detection, and secure administrator privileges.

More than 90 percent of businesses use AD as their identity management system, which serves as a master directory and the means to control access to enterprise services. Tools such as Bloodhound, Mimikatz, and Metasploit are useful for legitimate security research. However, they have also made it much easier for attackers to engage in credential-dumping, recovering plaintext or hashed passwords from systems, gaining Domain Admin privileges, and securing the “blueprint” of the network.

Learn how to protect Active Directory with deception and denial in the complete SC Magazine article by Carolyn Crandall.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published.

1 × one =

Ready to find out what’s lurking in your network?

Scroll to Top