AD Domain ServicesArchitecture & Design

Analyzing LSASS memory dumps for credential theft

LSASS (Local Security Authority Subsystem Service) is the Windows process that handles interactive logons and manages authentication-related secrets in memory. Because it sits at the center of Windows authentication, attackers often try to access or dump LSASS memory to steal credentials or reusable secrets. This guide focuses on defensive detection, triage, and response—what to look…
Read more
AD Domain ServicesArchitecture & Design

Detecting Shadow Admin accounts

1) What is a “shadow admin” in AD? A shadow admin is any user, group, or service principal that can achieve admin outcomes—such as modifying privileged group membership, controlling GPOs, resetting admin credentials, or replicating directory secrets—without being a direct member of obvious privileged groups. Why they’re hard to spot They hide in structure…
Read more
AD Domain ServicesArchitecture & Design

How to track rogue domain controllers

Tracking Rogue Domain Controllers in Active Directory (Detection + Response Playbook) A rogue domain controller (DC) is any system that is acting as a DC or participating in DC trust/replication without being approved, expected, and controlled. In practice, “rogue DC” includes: An attacker-promoted DC in a compromised domain An unauthorized (shadow IT) DC spun up by an admin or a…
Read more