Browse Skills

Performing Active Directory Vulnerability Assessment

v1.0.0

Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations, privilege escalation paths, and attack vectors.

mukul975
4

Performing Active Directory Penetration Test

v1.0.0

Conduct a focused Active Directory penetration test to enumerate domain objects, discover attack paths with BloodHound, exploit Kerberos weaknesses, escalate privileges via ADCS/DCSync, and demonstrate domain compromise.

mukul975
4

Performing Active Directory Forest Trust Attack

v1.0.0

Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.

mukul975
4

Performing Active Directory Compromise Investigation

v1.0.0

Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.

mukul975
5

Performing Active Directory Bloodhound Analysis

v1.0.0

Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised users to Domain Admin.

mukul975
4

Performing Access Review And Certification

v1.0.0

Conduct systematic access reviews and certifications to ensure users have appropriate access rights aligned with their roles. This skill covers review campaign design, reviewer selection, risk-based p

mukul975
3

Performing Access Recertification With Saviynt

v1.0.0

Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.

mukul975
3

Monitoring Darkweb Sources

v1.0.0

>

mukul975
3

Mapping Mitre Attack Techniques

v1.0.0

>

mukul975
6

Managing Intelligence Lifecycle

v1.0.0

>

mukul975
3

Managing Cloud Identity With Okta

v1.0.0

>

mukul975
2

Investigating Ransomware Attack Artifacts

v1.0.0

Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.

mukul975
5