det.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon Server des Unterhaltungsfernsehen Ehrenfeld zum dezentralen Diskurs.

Administered by:

Server stats:

1.7K
active users

#ActiveDirectory

3 posts3 participants2 posts today
benzogaga33 :verified:<p>Générer un rapport de sécurité Active Directory avec AD-Miner et BloodHound <a href="https://www.it-connect.fr/generer-un-rapport-de-securite-active-directory-avec-ad-miner-et-bloodhound/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">it-connect.fr/generer-un-rappo</span><span class="invisible">rt-de-securite-active-directory-avec-ad-miner-et-bloodhound/</span></a> <a href="https://mamot.fr/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://mamot.fr/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mamot.fr/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mamot.fr/tags/S%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sécurité</span></a></p>
Schnabel<p>Is it standard behavior for Active Directory to not return an attribute when its value is NULL?</p><p><a href="https://mastodontech.de/tags/ldap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ldap</span></a><br><a href="https://mastodontech.de/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a></p>
iX Magazin<p>iX-Workshop: Lokales Active Directory gegen Angriffe absichern</p><p>Lernen Sie, wie Angreifer Active Directory kompromittieren und wie Sie Ihre AD-Umgebung effektiv vor Ransomware und anderen Cyberangriffen schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Lokales-Active-Directory-gegen-Angriffe-absichern-10733868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Loka</span><span class="invisible">les-Active-Directory-gegen-Angriffe-absichern-10733868.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://lethallava.land/@ChrSt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ChrSt</span></a></span> <span class="h-card" translate="no"><a href="https://wetdry.world/@lucydev" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lucydev</span></a></span> I find it funny given how trivial it is to fuck up <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a>-based IT! </p><ul><li><a href="https://infosec.space/tags/Admins" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Admins</span></a> gonna have to learn <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> or find themselves another <a href="https://infosec.space/tags/Job" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Job</span></a>. We ain't using <a href="https://infosec.space/tags/MSDOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSDOS</span></a> or <a href="https://infosec.space/tags/CPM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CPM</span></a> in the 2000s and Windows too needs get rid of since it's <a href="https://infosec.space/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>!</li></ul><p>If the <a href="https://infosec.space/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> is lazy, they could just pay <span class="h-card" translate="no"><a href="https://ubuntu.social/@ubuntu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ubuntu</span></a></span> for <a href="https://infosec.space/tags/Landscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Landscape</span></a> and get all that fancy shit incl. <a href="https://infosec.space/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> support...</p>
Netzpalaver<p>Fehlkonfiguration statt Zero-Day – warum saubere App-Konfiguration entscheidend ist</p><p><a href="https://social.tchncs.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.tchncs.de/tags/EntraID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EntraID</span></a> <a href="https://social.tchncs.de/tags/Fehlkonfiguration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fehlkonfiguration</span></a> @Outpost24 <a href="https://social.tchncs.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.tchncs.de/tags/Sicherheitshygiene" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitshygiene</span></a></p><p><a href="https://netzpalaver.de/2025/10/07/fehlkonfiguration-statt-zero-day-warum-saubere-app-konfiguration-entscheidend-ist/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/10/07/fehl</span><span class="invisible">konfiguration-statt-zero-day-warum-saubere-app-konfiguration-entscheidend-ist/</span></a></p>
benzogaga33 :verified:<p>Active Directory : IAM + ITDR, le duo gagnant pour sécuriser vos identités <a href="https://www.it-connect.fr/active-directory-iam-itdr-le-duo-gagnant-pour-securiser-vos-identites/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">it-connect.fr/active-directory</span><span class="invisible">-iam-itdr-le-duo-gagnant-pour-securiser-vos-identites/</span></a> <a href="https://mamot.fr/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://mamot.fr/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a></p>
Karl Voit :emacs: :orgmode:<p><span class="h-card" translate="no"><a href="https://ioc.exchange/@matthew_d_green" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>matthew_d_green</span></a></span> from Johns Hopkins University on <a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://graz.social/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a>:<br><a href="https://blog.cryptographyengineering.com/2025/09/10/kerberoasting/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cryptographyengineering.c</span><span class="invisible">om/2025/09/10/kerberoasting/</span></a></p><p>"But there’s also another class of <a href="https://graz.social/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a>: these are the ones that can’t possibly exist in important production software, because there’s no way anyone could still do that in 2025."</p><p>"Unfortunately, Active Directory is a monster dragged from the depths of time."</p><p>legacy <a href="https://graz.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>: "This is very bad, because the <a href="https://graz.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> is exceptionally terrible."</p><p>"The result of this is that the user learns an account <a href="https://graz.social/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> that lets them completely control that essential Service. And the result of that (with a few extra steps) is often <a href="https://graz.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a>."</p><p>"It’s actually a terrible design that should have been done away with decades ago."</p><p>"Microsoft doesn’t seem to do anything proactive [...]. Instead this all seems much more like a reluctant and half-baked bit of <a href="https://graz.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> management."</p><p><a href="https://graz.social/tags/AD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AD</span></a> <a href="https://graz.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://graz.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://graz.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://graz.social/tags/IndustryStandardMyAss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IndustryStandardMyAss</span></a> <a href="https://graz.social/tags/fail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fail</span></a></p>
iX Magazin<p>iX-Workshop: Lokales Active Directory gegen Angriffe absichern </p><p>Lernen Sie, wie Angreifer Active Directory kompromittieren und wie Sie Ihre AD-Umgebung effektiv vor Ransomware und anderen Cyberangriffen schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Lokales-Active-Directory-gegen-Angriffe-absichern-10644017.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Loka</span><span class="invisible">les-Active-Directory-gegen-Angriffe-absichern-10644017.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
The New Oil<p>How weak <a href="https://mastodon.thenewoil.org/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> and other failings led to catastrophic breach of <a href="https://mastodon.thenewoil.org/tags/Ascension" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ascension</span></a></p><p><a href="https://arstechnica.com/security/2025/09/how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">09/how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/Kerberoasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kerberoasting</span></a> <a href="https://mastodon.thenewoil.org/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a></p>
HiSolutions<p>🔐 Kennwortrichtlinien im Active Directory – ein unterschätztes Risiko!</p><p>Viele Admins glauben, man kann Passwort-Richtlinien für einzelne Systeme per GPO setzen – ein gefährlicher Irrglaube!</p><p>Der neue Beitrag von HiSolutions zeigt, wie dieses Missverständnis zu schwachen Passwörtern und erhöhtem Kompromittierungsrisiko führen kann.</p><p>💡 Mit praktischen Beispielen und klaren Empfehlungen für eine sichere AD-Konfiguration.</p><p>👉 Jetzt lesen und Passwortsicherheit richtig verstehen:</p><p><a href="https://research.hisolutions.com/2025/09/kennwortrichtlinien-im-active-directory-ein-missverstaendnis-mit-folgen/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">09/kennwortrichtlinien-im-active-directory-ein-missverstaendnis-mit-folgen/</span></a></p><p><a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/Passwortsicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwortsicherheit</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SysAdmin</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a></p>
IT News<p>How weak passwords and other failings led to catastrophic breach of Ascension - Last week, a prominent US senator called on the Federal Trad... - <a href="https://arstechnica.com/security/2025/09/how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">09/how-weak-passwords-and-other-failings-led-to-catastrophic-breach-of-ascension/</span></a> <a href="https://schleuss.online/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a> <a href="https://schleuss.online/tags/networkbreaches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkbreaches</span></a> <a href="https://schleuss.online/tags/kerberoasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kerberoasting</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/features" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>features</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/kerberos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kerberos</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Karl Voit :emacs: :orgmode:<p>"While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful <a href="https://graz.social/tags/EntraID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EntraID</span></a> <a href="https://graz.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> that I will probably ever find. This vulnerability could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant." 😲 </p><p><a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dirkjanm.io/obtaining-global-a</span><span class="invisible">dmin-in-every-entra-id-tenant-with-actor-tokens/</span></a></p><p><a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://graz.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://graz.social/tags/Cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloud</span></a> <a href="https://graz.social/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> <a href="https://graz.social/tags/AD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AD</span></a> <a href="https://graz.social/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://graz.social/tags/AzureAD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AzureAD</span></a></p>
Richi Jennings<p>“Like an arsonist selling firefighting services,” quips this 76-year-old.</p><p>U.S. senator <a href="https://vmst.io/tags/RonWyden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RonWyden</span></a> (pictured) is demanding the <a href="https://vmst.io/tags/FTC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FTC</span></a> do something about <a href="https://vmst.io/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> already. He says Satya’s crew are to blame for some awful <a href="https://vmst.io/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> attacks exploiting a vulnerability that’s more than 10 years old.</p><p>Known as <a href="https://vmst.io/tags/Kerberoasting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kerberoasting</span></a>, the exploit affects <a href="https://vmst.io/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> installs that aren’t configured to modern specs. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we wonder where to point fingers: <a href="https://securityboulevard.com/2025/09/ron-wyden-microsoft-kerberoasting-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2025/09/</span><span class="invisible">ron-wyden-microsoft-kerberoasting-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
iX Magazin<p>iX-Workshop: Lokales Active Directory gegen Angriffe absichern </p><p>Lernen Sie, wie Angreifer Active Directory kompromittieren und wie Sie Ihre AD-Umgebung effektiv vor Ransomware und anderen Cyberangriffen schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Lokales-Active-Directory-gegen-Angriffe-absichern-10627759.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Loka</span><span class="invisible">les-Active-Directory-gegen-Angriffe-absichern-10627759.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
IT News<p>Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” - A prominent US senator has called on the Federal Trade Commi... - <a href="https://arstechnica.com/security/2025/09/senator-blasts-microsoft-for-making-default-windows-vulnerable-to-kerberoasting/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">09/senator-blasts-microsoft-for-making-default-windows-vulnerable-to-kerberoasting/</span></a> <a href="https://schleuss.online/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/rc4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rc4</span></a></p>
Kevin Veen-Birkenbach<p><strong>Wissensmanagement im Nexus: MediaWiki, Discourse &amp; Confluence out of the Box</strong></p> In modernen Organisationen ist Wissen die entscheidende Ressource. Ob als kollaboratives Nachschlagewerk, als strukturierte Projektdokumentation oder als lebendige Community-Diskussion: ohne ein gut eingebundenes Wiki- oder Wissenssystem verlieren Teams wertvolle Zeit.Das Infinito.Nexus stellt deshalb drei etablierte Systeme out of the box bereit: MediaWiki, Discourse und Confluence. Alle drei sind nahtlos über LDAP und OpenID Connect (OIDC) in den eigenen Mikrokosmos eingebunden – entweder über das vom Nexus bereitgestellte OpenLDAP oder über eine direkte Active-Directory-Integration, falls bereits eine Microsoft-Infrastruktur vorhanden ist. Damit wird Infinito.Nexus zu einer echten Alternative zu Microsoft SharePoint: leistungsfähig, flexibel, anpassbar und voll OnPremise kontrollierbar. […] <p><a href="https://blog.infinito.nexus/blog/2025/09/05/wissensmanagement-im-nexus-mediawiki-discourse-confluence-out-of-the-box/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.infinito.nexus/blog/2025/</span><span class="invisible">09/05/wissensmanagement-im-nexus-mediawiki-discourse-confluence-out-of-the-box/</span></a></p>
iX Magazin<p>iX-Workshop: Active Directory Hardening – Vom Audit zur sicheren Umgebung</p><p>Lernen in einer Übungsumgebung: Sicherheitsrisiken in der Windows-Active-Directory-Infrastruktur erkennen und beheben, um die IT vor Cyberangriffen zu schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Active-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10607280.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Acti</span><span class="invisible">ve-Directory-Hardening-Vom-Audit-zur-sicheren-Umgebung-10607280.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
LDAP Tool Box Project<p>Release 0.6 of LTB Common, our PHP Framework for Self Service Password, White Pages and Service Desk</p><p><a href="https://github.com/ltb-project/ltb-common/releases/tag/v0.6.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/ltb-project/ltb-com</span><span class="invisible">mon/releases/tag/v0.6.0</span></a></p><p><a href="https://floss.social/tags/LDAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LDAP</span></a> <a href="https://floss.social/tags/PHP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PHP</span></a> <a href="https://floss.social/tags/OpenLDAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenLDAP</span></a> <a href="https://floss.social/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://floss.social/tags/IAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IAM</span></a></p>
iX Magazin<p>iX-Workshop: Lokales Active Directory gegen Angriffe absichern </p><p>Lernen Sie, wie Angreifer Active Directory kompromittieren und wie Sie Ihre AD-Umgebung effektiv vor Ransomware und anderen Cyberangriffen schützen.</p><p><a href="https://www.heise.de/news/iX-Workshop-Lokales-Active-Directory-gegen-Angriffe-absichern-10539276.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/iX-Workshop-Loka</span><span class="invisible">les-Active-Directory-gegen-Angriffe-absichern-10539276.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/iXWorkshops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iXWorkshops</span></a> <a href="https://social.heise.de/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
ij<p>Ich bräuchte mal wieder <a href="https://nerdculture.de/tags/followerpower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>followerpower</span></a>: </p><p>In einem MS <a href="https://nerdculture.de/tags/activedirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>activedirectory</span></a> wie organisiert ihr da User und Gruppen?<br>Was sind so Best Practices bei einem AD, gerne auch einen Link in die Kommentar zur Lektuere. </p><p>Hintergrund: <br>Ich habe das Gefuehl, dass unser geerbetes AD etwas unstrukturiert ist. So finden sich Gruppen innerhalb der CN=Users. Ich wuerde ausserhalb von Users eigentlich eher sowas wie eine OU=Groups erwarten. <br>Zudem will ich NIS auf einigen Linux-Kisten durch eine LDAP-Anbindung an das AD abloesen. <br>Es sind ca. 300 User, die aber mitunter relativ stark fluktieren (Studenten). </p><p>Bin fuer Tipps und Ideen dankbar!</p><p><a href="https://nerdculture.de/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a></p>