Deflecting Active Directory Attacks

  • Jan De Ciercq


Many of today’s enterprises use Microsoft Active Directory (AD) either as their enterprise directory or as the network OS (NOS) directory for their Windows infrastructure. AD has become an important asset in most enterprises, and valuable things must be protected accordingly. This paper provides examples of attacks against Active Directory and shows how an enterprise directory can be protected against them. The attacks addressed in this paper include password cracking-, elevation of privilege- and denial-of-service-based attacks. The main goal of this paper is to show AD users the urgent need for taking a multi-pronged approach toward locking down and securing AD.


Active Directory Authentication Protocol Trust Relationship User Account Domain Administrator 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [IETFO3]
    IETF website, “Public Key Cryptography for Initial Authentication in Kerberos”:, 2003
  2. [MS 102]
    Microsoft Knowledge Base website, article “MSO2-001: Forged SID could result in elevated privileges in Windows 2000”:, 2002
  3. [MS 104]
    Microsoft Knowledge Base website, article “How To Use Visual Basic Script to Clear SidHistory”:, 2004

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Jan De Ciercq
    • 1
  1. 1.Hewlett-Packard, HP Security OfficeEvereBelgium

Personalised recommendations