Active Directory Security Tip #2: Active Directory User Accounts
文章讨论了不同类型用户账户(如标准、服务和管理员账户)及其潜在安全风险,并列出了可能导致账户易受攻击的配置问题(如密码过期、加密不安全等),同时提供了一个PowerShell脚本用于检测脆弱账户。
2025-9-15 00:3:0
Author: adsecurity.org(查看原文)
阅读量:5
收藏
Sep142025
There are several different types of user accounts – at least how they are used. There are standard user accounts, service accounts, and admin accounts.
There are numerous user account settings that can make them vulnerable. These configurations include:
Inactive – account has not logged on or changed the password in over 180 days which may flag this account as inactive/stale – Accounts known to be inactive should be disabled.
Reversible encryption – effectively clear-text on DCs – there’s no reason for this to be set.
Password not required – account may not have an associated password – possibly set by provisioning system – There’s no reason for this to be set. * Password never expires – password very likely to be old – should not be set on standard user accounts.
Kerberos DES encryption enabled – DES is a weaker encryption method which enables faster password brute-forcing. There’s no reason for this to be set.
Account does not require Kerberos pre-authentication – enables a trivial attack method for discovering the account’s password (AS-REProasting). May have been set for a compatibility issue with an application. Kerberos pre-authentication should always be required.
Account cannot change password – password may not change. Standard user accounts should not have this set. Attackers will look for these configurations, so best to review and adjust regularly. Admin accounts and service accounts require additional protection above and beyond standard user accounts.
I improve security for enterprises around the world working for TrustedSec & I am @PyroTek3 on Twitter.
Read the About page (top left) for information about me. :)
https://adsecurity.org/?page_id=8