<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Active-Directory on it-learn.io | IT, Networking &amp; Cybersecurity Blog</title><link>https://blog.it-learn.io/tags/active-directory/</link><description>Recent content in Active-Directory on it-learn.io | IT, Networking &amp; Cybersecurity Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.it-learn.io/tags/active-directory/index.xml" rel="self" type="application/rss+xml"/><item><title>Pass-the-Hash: Why Stealing the Hash Is Just as Good as the Password</title><link>https://blog.it-learn.io/posts/2026-04-15-pass-the-hash-why-the-hash-is-as-good-as-the-password/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-15-pass-the-hash-why-the-hash-is-as-good-as-the-password/</guid><description>&lt;p&gt;Pass-the-Hash (PtH) is arguably the most impactful lateral movement technique in Windows environments. It transforms credential access into network-wide compromise without requiring password cracking, works across the majority of enterprise network services, and has been a core component of some of the most destructive cyberattacks in history — including NotPetya and numerous ransomware operations. Understanding its mechanics is prerequisite to understanding why so many Active Directory environments remain vulnerable despite years of awareness.&lt;/p&gt;</description></item><item><title>Kerberoasting: Stealing Service Tickets to Crack Passwords Offline</title><link>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-14-kerberoasting-stealing-service-tickets-to-crack-passwords/</guid><description>&lt;p&gt;Kerberoasting is one of the most reliably effective Active Directory attack techniques: it requires only a valid domain account, leaves minimal traces by default, and yields plaintext service account credentials that often grant significant lateral movement opportunities. Unlike many AD attacks that require elevated access or interaction with specific hosts, Kerberoasting operates entirely through legitimate Kerberos protocol requests — making it difficult to block without fundamentally changing service account management practices.&lt;/p&gt;</description></item><item><title>Cisco ISE Active Directory Integration: Complete Configuration Guide</title><link>https://blog.it-learn.io/posts/2026-04-02-cisco-ise-active-directory-integration-complete-guide/</link><pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.it-learn.io/posts/2026-04-02-cisco-ise-active-directory-integration-complete-guide/</guid><description>&lt;p&gt;Cisco Identity Services Engine (ISE) is built around the concept of identity-aware policy — but ISE itself doesn&amp;rsquo;t store your users. It needs to talk to your directory. For most enterprise environments, that directory is &lt;strong&gt;Active Directory&lt;/strong&gt;. Getting the ISE-to-AD integration right is the foundation everything else sits on: 802.1X authentication, authorization policy, guest flows, posture assessment, and profiling all depend on it.&lt;/p&gt;
&lt;p&gt;This guide walks through the complete integration from scratch: prerequisites, joining ISE to AD, configuring the identity store, mapping AD groups into policy, and troubleshooting when things don&amp;rsquo;t work.&lt;/p&gt;</description></item></channel></rss>