Browse Skills
Performing Active Directory Vulnerability Assessment
v1.0.0Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations, privilege escalation paths, and attack vectors.
Performing Active Directory Penetration Test
v1.0.0Conduct a focused Active Directory penetration test to enumerate domain objects, discover attack paths with BloodHound, exploit Kerberos weaknesses, escalate privileges via ADCS/DCSync, and demonstrate domain compromise.
Performing Active Directory Forest Trust Attack
v1.0.0Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust key extraction, cross-forest SID history abuse detection, and inter-realm Kerberos ticket assessment.
Performing Active Directory Compromise Investigation
v1.0.0Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos ticket anomalies to identify attacker persistence and lateral movement paths.
Performing Active Directory Bloodhound Analysis
v1.0.0Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised users to Domain Admin.
Performing Access Review And Certification
v1.0.0Conduct systematic access reviews and certifications to ensure users have appropriate access rights aligned with their roles. This skill covers review campaign design, reviewer selection, risk-based p
Performing Access Recertification With Saviynt
v1.0.0Configure and execute access recertification campaigns in Saviynt Enterprise Identity Cloud to validate user entitlements, revoke excessive access, and maintain compliance with SOX, SOC2, and HIPAA.
Monitoring Darkweb Sources
v1.0.0>
Mapping Mitre Attack Techniques
v1.0.0>
Managing Intelligence Lifecycle
v1.0.0>
Managing Cloud Identity With Okta
v1.0.0>
Investigating Ransomware Attack Artifacts
v1.0.0Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption scope, and recovery options.