Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
From Code to Coverage (Part 3): SDFlags - The Log Field I'd Been Ignoring That Unlocked Attack Path Detection
Published:
January 15, 2026

From Code to Coverage (Part 3): SDFlags - The Log Field I'd Been Ignoring That Unlocked Attack Path Detection

By:
Andrew Schwartz
Share icon
Glitch effectGlitch effectGlitch effect

The story so far

In Part 1, we learned that Impacket's LDAP reconnaissance tools use OID-based filters that get transformed into bitwise operations in Event ID 1644 logs, breaking our string-matching detection rules.

Part 2 revealed how whitespace variations in LDAP filter formatting can cause identical queries to log differently, creating another detection blind spot.

Now, in Part 3, I'm going to share a different kind of story. Not about a problem I was actively investigating, but about something I'd been walking past in my logs for weeks. Something I wasn't even looking at because I was so focused on filters and attributes.

It started the day I finally noticed a field called "SDFlags."


The thing I wasn't looking at

After Parts 1 and 2, I'd been laser-focused on LDAP filters and attributes. I was building detection rules based on filter patterns, tracking which attributes attackers queried, correlating searches. Event 1644 logs were my home.

But I was only looking at specific parts of those logs:

  • Filter field - This is what I analyzed in Part 1

  • Attributes field - This is what mattered for detection rules

  • Visited/Returned entries - For understanding query scope

Then one day, while scrolling through logs, something finally registered in my peripheral vision:


Figure 1: SharpHound group enumeration query captured in Event ID 1644, showing SDFlags:0x5 (Owner + DACL) and the characteristic sAMAccountType filter for all group types.

SDFlags: 0x5

I'd seen this field dozens of times before. But I'd been so focused on the filter and attributes that my brain had just... skipped over it. It was log noise. Extra metadata. Not what I was looking for.

Until the day I actually saw it.

"What is SDFlags?"


The first investigation: When does it appear?

Once I noticed SDFlags, I couldn't unsee it. I started looking for patterns:

# When does SDFlags appear?

Get-WinEvent -FilterHashtable @{

    LogName = 'Directory Service'

    ID = 1644

    StartTime = (Get-Date).AddDays(-7)

} | Where-Object { $_.Message -match 'SDFlags' } | 

Measure-Object

# Result: 127 events with SDFlags in the past week


# What attributes are requested when SDFlags appear?

Get-WinEvent -FilterHashtable @{

    LogName = 'Directory Service'

   ID = 1644

    StartTime = (Get-Date).AddDays(-7)

} | Where-Object { $_.Message -match 'SDFlags' } | 

ForEach-Object {

    if ($_.Message -match "Attribute selection:\s*\r?\n(.+?)\r?\n") {

        $matches[1]

    }

} | Group-Object | Sort-Object Count -Descending | Select-Object -First 5

# Result: 100% of SDFlags queries include "nTSecurityDescriptor"

Pattern discovered: SDFlags ONLY appears when queries request the nTSecurityDescriptor attribute.

Okay, so SDFlags and nTSecurityDescriptor are connected. But what IS nTSecurityDescriptor? And why should I care?

This was turning into a deeper investigation than I expected.



Following the OID: What is SDFlags?

I took the OID from the "Controls" field and searched: 1.2.840.113556.1.4.801

Microsoft's MS-ADTS specification, Section 3.1.1.3.4.1.11: LDAP_SERVER_SD_FLAGS_OID

From the spec, this control is used to specify which security descriptor information to return.

So it's filtering what data gets returned. But filtering WHAT exactly?

The bitmask values:

  • 0x1 = OWNER_SECURITY_INFORMATION

  • 0x2 = GROUP_SECURITY_INFORMATION

  • 0x4 = DACL_SECURITY_INFORMATION

  • 0x8 = SACL_SECURITY_INFORMATION

So 0x5 = 0x1 + 0x4 = Owner + DACL.


Why SDFlags matters: The SACL permission problem

Here's something I didn't understand at first: why do tools need to use SDFlags at all?

The answer is permissions. As FalconForce explains in their SOAPHound blog post, when you query nTSecurityDescriptor without SDFlags, Active Directory tries to return all four components by default (Owner, Group, DACL, and SACL). But most accounts don't have permission to read the SACL.

Here's the catch: when AD can't return all requested components, it returns nothing.

SDFlags solves this by letting you specify exactly which components you want. By requesting only Owner + DACL (0x5) or just DACL (0x4), tools avoid the SACL permission issue and successfully retrieve the security descriptor data.

This is why attack path tools must use SDFlags. Without it, the queries fail silently for non-privileged accounts.


Down the rabbit hole: What even is nTSecurityDescriptor?

I went back to Microsoft documentation and found MS-DTYP Section 2.4.6: SECURITY_DESCRIPTOR. The structure contains four components: OwnerSid, GroupSid, DACL (Discretionary Access Control List), and SACL (System Access Control List).

I needed to see this in action. Lab time:

Figure 2: Querying nTSecurityDescriptor reveals who has the permissions on the Domain Admins Group. This is what attackers are after: the permission relationships that reveal attack paths.

My lab Domain Admins group had standard, expected permissions - System, Administrators, Domain Admins, and Enterprise Admins with GenericAll, plus some well-known SIDs with ReadProperty.

But here's what hit me: I could see the permissions.

nTSecurityDescriptor contains:

  • Who has access (IdentityReference)

  • What they can do (ActiveDirectoryRights)

  • Whether it's allowed or denied (AccessControlType)

In my lab, everything was configured correctly. But in a production environment with years of changes, manual modifications, and inherited permissions? You might find:

  • Help Desk with WriteProperty on Domain Admins (can add members)

  • A regular user account that owns a privileged group (can modify permissions)

  • Service accounts with GenericAll on administrative groups

  • Contractors with extended rights they shouldn't have

This is what attack path tools need to discover. Without querying nTSecurityDescriptor, you can't see these permission relationships. You'd know:

  • What groups exist

  • Who is a member of what

  • But NOT who has permissions to modify those groups

That last piece - the permissions data - is what makes attack path discovery possible.


The "aha!" moment: This is how BloodHound works

I immediately thought about BloodHound. I'd run it in my lab before and it showed me attack paths. But I never really understood HOW it found those paths.

Now it made sense.

What BloodHound needs to find attack paths:

  • Who are the users? (basic LDAP query)

  • What groups exist? (basic LDAP query)

  • Who is a member of what? (member attribute)

  • WHO HAS PERMISSIONS ON WHAT? - This is nTSecurityDescriptor!

Without nTSecurityDescriptor, you can't see:

  • That a help desk group can modify privileged groups

  • That User X owns Group Y (and owner can always modify permissions)

  • That a service account has GenericAll on administrative objects

  • That seemingly unrelated users have password reset rights

This is THE critical piece of attack path discovery. You need the permission relationships, not just the membership relationships.

I went back and looked at SharpHound queries in my logs. Every single one requested nTSecurityDescriptor.

SharpHound DCOnly collection:

Attributes: nTSecurityDescriptor, sAMAccountName, objectSid, ...

  SDFlags: 0x4

SharpHound group enumeration:

  Attributes: nTSecurityDescriptor, sAMAccountName, objectSid, member, ...

  SDFlags: 0x5

SharpHound cert template enumeration:

  Attributes: nTSecurityDescriptor, distinguishedName, name, ...

  SDFlags: 0x5

They ALL query nTSecurityDescriptor. Because without it, you can't map who has the ability to compromise what.


Understanding SDFlags: Why different values?

Now that I understood what nTSecurityDescriptor was, I had another question: Why does SDFlags appear at all? And why do the values differ?

After watching SharpHound in action, the pattern was clear: whenever it requested nTSecurityDescriptor, it used the SDFlags control. The Microsoft documentation says SDFlags lets you specify which security descriptor components to retrieve: Owner, Group, DACL, or SACL.

I looked through my logs and found two distinct patterns:

Pattern 1: SDFlags=0x4 (DACL-only)

When I saw it:

  • General user enumeration

  • Computer object queries

  • Domain object enumeration

  • Trust relationship queries

What they're asking: "Who has permissions on these objects?"

Example from logs:

Filter: (samAccountType=805306368)  # Computer accounts

Attributes: nTSecurityDescriptor, sAMAccountName, dNSHostName, ...

SDFlags: 0x4

For computers, ownership doesn't usually matter for attack paths. You just need to know "does anyone have GenericAll or AllExtendedRights?"

Pattern 2: SDFlags=0x5 (Owner + DACL)

When I saw it:

  • Group enumeration (100% of the time!)

  • Certificate template queries (100% of the time!)

  • High-value object enumeration

What they're asking: "Who has permissions on these objects AND who owns them?"

Example from logs:

Filter: (|(sAMAccountType=268435456)(sAMAccountType=268435457)...)  # Security groups

Attributes: nTSecurityDescriptor, sAMAccountName, objectSid, member, ...

SDFlags: 0x5

This makes sense when you think about attack paths. In a misconfigured environment, you might find something like this: 

Group: "Domain Admins"

Members: captain, thor, thanos

DACL (what SDFlags=0x4 shows):

  - "Help Desk" has WriteProperty (can add members)

Owner (what SDFlags=0x5 additionally shows):

  - "loki" (regular user!) owns the group

Attack paths:

  • Path 1: Anyone in Help Desk can add themselves to Domain Admins

  • Path 2: loki owns group, modifies DACL, grants self WriteProperty, adds to Domain Admins

Without the Owner information (0x5 includes it, 0x4 doesn't), you'd miss Path 2 completely!

This is why SharpHound uses 0x5 for groups. Ownership of groups is a critical attack path that's often misconfigured.

Whether SDFlags is used for performance, convention, or just how the developer wrote the code doesn't really matter for detection purposes. What matters is the pattern:

  • Legitimate admin tools: Query nTSecurityDescriptor WITHOUT SDFlags

  • SharpHound: ALWAYS uses SDFlags when querying nTSecurityDescriptor

That difference makes it detectable.


Confirming in the source code

Nasreddine Bencherchali reviewed the SharpHound source code and found exactly where SDFlags is implemented, sending me the relevant links to confirm what I was seeing in the logs.

The flag is set in SharpHoundCommon's LdapConnectionPool.cs. In my testing, different Collection Methods produced different values: 0x4 for general enumeration and 0x5 for groups.


Figure 3: LdapConnectionPool.cs showing SDFlags set to Dacl | Owner (0x5) when requesting security descriptors.

In my testing, different Collection Methods produced different values: 0x4 for general enumeration and 0x5 for groups.


The detection opportunity

After finally noticing SDFlags and understanding what it meant, I realized I'd been walking past a near-perfect detection signature.

SDFlags usage is extremely rare in legitimate operations.

I checked our environment:

  • Legitimate admin tools: Rarely use SDFlags in my testing (they query specific objects, not mass enumeration)

  • Backup software: Doesn't use SDFlags (doesn't need permission data)

  • Monitoring tools: Don't use SDFlags (don't need security descriptors)

The only things I found using SDFlags:

  1. SharpHound (attack path tool)

  2. My own testing (after learning about it)

That's it.

The detection pattern:

Mass LDAP enumeration (100+ objects)

  + nTSecurityDescriptor attribute

  + SDFlags control (0x4 or 0x5)

= Attack path discovery in progress


Tool

Filter Pattern

SDFlags

Attributes

SharpHound

Group sAMAccountType

0x5

nTSecurityDescriptor, member, ...

Custom Scripts

Varies

Rare

Varies

Legitimate Admins

Specific DN

Typically none

Basic attributes

Even better, I could differentiate tools: the combination of SDFlags=0x5 + group enumeration is HIGHLY specific to BloodHound/SharpHound.


Validating the pattern

To confirm this, I ran SharpHound in my lab with different collection methods:


Test 1:
DCOnly (SharpHound.exe -c DCOnly):

Event 1644 logs showed:

  • Multiple queries with SDFlags: 0x4 (users, computers, domains)

  • Multiple queries with SDFlags: 0x5 (groups, cert templates)

  • ALL queries requested nTSecurityDescriptor


Test 2:
Group Collection (SharpHound.exe -c Group):

Event 1644 logs showed:

  • Consistent SDFlags: 0x5 for ALL group queries

  • Filter: (|(sAMAccountType=268435456)(sAMAccountType=268435457)...)

  • Always included nTSecurityDescriptor


Test 3: Comparing to legitimate admin activity

I asked our AD admins to perform common tasks while I monitored Event 1644:


Legitimate activity:

Admin using ADUC to check "Domain Admins" members:

  Filter: (distinguishedName=CN=Domain Admins,CN=Users,DC=corp,DC=local)

  Attributes: member, description

  SDFlags: [None]

Admin using PowerShell to get group members:

  Filter: (sAMAccountName=Server Admins)

  Attributes: member, sAMAccountName

  SDFlags: [None]


SharpHound activity:

SharpHound group enumeration:

  Filter: (|(sAMAccountType=268435456)(sAMAccountType=268435457)...)

  Attributes: nTSecurityDescriptor, member, sAMAccountName, objectSid

  SDFlags: 0x5

  Returned: 847 groups


The difference is obvious:

  • Legitimate: Specific DN, basic attributes, no SDFlags

  • Attack tool: Mass enumeration, security attributes, SDFlags present


Building detection rules

After understanding what SDFlags means and confirming the pattern, I built detection rules based on this investigation.

In my testing, SharpHound consistently used SDFlags 0x4 and 0x5. Other attack path tools may use different values, which we'll explore in Part 4.

Note: The following are detection logic excerpts showing the key selection criteria. Field names use Elastic Common Schema (ECS). Adjust for your SIEM. The Source filter matches remote IP:port connections, filtering out local DC operations.

SharpHound group enumeration (SDFlags 0x5):

detection:

  selection_base:

    event.code: 1644

  selection_filter_samtypes:

    winlog.event_data.LDAPFilter|contains|all:

      - '(sAMAccountType=268435456)'

      - '(sAMAccountType=268435457)'

      - '(sAMAccountType=536870912)'

      - '(sAMAccountType=536870913)'

  selection_scope_subtree:

    winlog.event_data.SearchScope: 'subtree'

  selection_sdflags_owner_dacl:

    winlog.event_data.SearchFlags:

      - 'SDflags:0x5;'

  selection_src:

    winlog.event_data.Source|re: '^(\d{1,3}\.){3}\d{1,3}:\d{1,5}$'

  condition: selection_base and selection_filter_samtypes and selection_scope_subtree and selection_sdflags_owner_dacl and selection_src


Key takeaways

  1. Sometimes the most valuable signals are the ones you're not looking at yet. I was so focused on filters and attributes that SDFlags didn't register until one day it finally did.

  2. nTSecurityDescriptor is THE critical piece for attack path discovery. Without it, tools like BloodHound can't work. This makes it a reliable detection point.

  3. SDFlags reveals intent. The combination tells the story:
    • One object + nTSecurityDescriptor = Admin checking permissions
    • Mass objects + nTSecurityDescriptor + SDFlags = Attack path discovery

  4. Owner information matters for groups. SDFlags=0x5 (vs 0x4) specifically requests Owner data, which is why SharpHound uses it for group enumeration. Group ownership is often misconfigured and creates attack paths.

  5. Legitimate admins don't use SDFlags. In our production monitoring, only SharpHound and security research tools used it. Baseline your environment before deploying.



Conclusion: Pay attention to what you're ignoring

I'd been looking at Event 1644 logs for weeks. Analyzing filters, tracking attributes, and building detection rules. And the whole time, SDFlags was right there in the logs. I just wasn't seeing it.

The day I finally noticed that field, everything changed. What started as "Wait, what is that?" became:

  • Understanding how nTSecurityDescriptor works

  • Realizing this is THE foundation of attack path discovery

  • Recognizing the detection opportunity in SDFlags

  • Building high-confidence detection rules

  • Finding a pattern that only appears during attack path enumeration

This is what detection engineering actually looks like: Not just analyzing what you're focused on, but occasionally stepping back and asking, "What else is in these logs that I'm not paying attention to?"

The next time you're deep in an investigation, take a moment to look at the fields you've been skipping over. You might find the detection opportunity you didn't know you were looking for.



Thanks to Jonathan Johnson, Charlie Clark, Anton Ovrutsky, Matt Anderson, Tyler Bohlmann, Lindsey O'Donnell-Welch, Michael Haag, Nasreddine Bencherchali, and Adam Bienvenu for their help in reviewing this post.





Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • From Code to Coverage (Part 4): Hunting SOAPHound - The (!FALSE) Pattern

    SOAPHound's LDAP query (!soaphound=*) never appears in Event 1644 logs, but it transforms into (! (FALSE)) through LDAP optimization. Understanding this transformation reveals a unique detection signature that most defenders have never seen.
  • From Code to Coverage (Part 1): The OID Transformation That Hinders LDAP Detection

    Learn why your LDAP detection rules never fire and how to fix them. Hint: it's the OID-to-bitwise transformation.
  • From Code to Coverage (Part 2): The Whitespace Nightmare: Writing Sigma Rules That Actually Match

    Your LDAP detection rules work in the lab but fail in production. Here's why Event 1644 whitespace variations break your Sigma rules and how to fix them.
  • Recutting the Kerberos Diamond Ticket

    Clear up common misconceptions about the Kerberos Diamond Ticket and learn how to refine the technique for better OPSEC, including more realistic PAC details and support for service tickets. You’ll learn how to apply the idea securely to both Ticket Granting Tickets and Service Tickets, creating forgeries that blend in more effectively with legitimate Kerberos traffic. The result is a stealthier alternative to traditional Silver Tickets and a more convincing method that raises the bar for Kerberos forgeries.
  • PerfMon! What Is It Good For?

    Explore how Performance Monitor (PerfMon) counters can be used as alternative methods for detecting Kerberos roasting attacks, moving beyond the traditional reliance on Windows Events 4768/4769.
  • Full Transparency: Controlling Apple's TCC Part II

    The primary goal of Apple's Transparency, Consent, and Control (TCC) is to empower users with transparency regarding how their data is accessed and used by applications. In this Part 2, dig even deeper into the mechanism that runs TCC and what's happening in the background.
  • Where Do You Think You're Going? How Huntress Addresses Lateral Movement

    Huntress Managed EDR tackles lateral movement, a common attack tactic, with a layered approach to telemetry collection and detection. Read on to learn how we identify malicious activity while minimizing false positives.
  • Using Shodan Images to Hunt Down Ransomware Groups

    In this blog, we’re going to focus on how Shodan helps us unveil some of the infrastructure that supports ransomware actors.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy