{"id":33798,"date":"2024-07-12T05:10:32","date_gmt":"2024-07-12T05:10:32","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33798"},"modified":"2024-07-12T05:10:34","modified_gmt":"2024-07-12T05:10:34","slug":"adspider","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/adspider\/","title":{"rendered":"ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes"},"content":{"rendered":"\n<p>Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication <a href=\"https:\/\/github.com\/p0dalirius\/LDAPmonitor\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">metadata <\/a>and Update Sequence Number (USN) to filter current properties of objects.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Parameters<\/strong><a href=\"https:\/\/github.com\/DrunkF0x\/ADSpider#parameters\"><\/a><\/h2>\n\n\n\n<p><strong>DC<\/strong>&nbsp;&#8211; domain controller FQDN.<br><strong>Formatlist<\/strong>&nbsp;&#8211; output in list instead of table.<br><strong>ExcludelastLogonTimestamp<\/strong>&nbsp;&#8211; exclude lastLogonTimestamp events from output<br><strong>DumpAllObjects<\/strong>&nbsp;&#8211; dump all active directory before start. In case of changes It will show you all previous values. But in large domains use it on your own risk (time and resource consuming).<br><strong>Short<\/strong>&nbsp;&#8211; in output will be only AttributeName, AttributeValue, LastOriginChangeTime and Explanation.<br><strong>Output<\/strong>&nbsp;&#8211; create XML file with all output.<br><strong>ExcludeObjectGUID<\/strong>&nbsp;&#8211; exclude Active Directory object with specific GUID.<br><strong>Sleep<\/strong>&nbsp;&#8211; time interval between requests for USN number. By default &#8211; 30 seconds.<br><strong>USN<\/strong>&nbsp;&#8211; specify started USN.<br><strong>DisplayXML<\/strong>&nbsp;&#8211; display previous captured XML file.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To Use<\/strong><a href=\"https:\/\/github.com\/DrunkF0x\/ADSpider#how-to-use\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Prerequisites<\/strong><a href=\"https:\/\/github.com\/DrunkF0x\/ADSpider#prerequisites\"><\/a><\/h3>\n\n\n\n<p>PowerShell module for Active Directory<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Domain Computer<\/strong><a href=\"https:\/\/github.com\/DrunkF0x\/ADSpider#domain-computer\"><\/a><\/h3>\n\n\n\n<p>Just run module in powershell session from domain user. For better performance use domain controller FQDN instead of IP address.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Import-module .\\ADSpider.ps1\nInvoke-ADSpider -DC DC01.domain.com<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Non-Domain Computer<\/strong><a href=\"https:\/\/github.com\/DrunkF0x\/ADSpider#non-domain-computer\"><\/a><\/h3>\n\n\n\n<p>Start powershell session with domain user with runas. Check that domain controller accessible. For better performance use domain controller FQDN instead of IP address.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>## From cmd or powershell\nrunas \/netonly \/u:domain.com\\MyUser powershell\n## From powershell\nImport-module .\\ADSpider.ps1\nInvoke-ADSpider -DC DC01.domain.com<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update Sequence Number (USN) to filter current properties of objects. Parameters DC&nbsp;&#8211; domain controller FQDN.Formatlist&nbsp;&#8211; output in list instead of table.ExcludelastLogonTimestamp&nbsp;&#8211; exclude lastLogonTimestamp events from outputDumpAllObjects&nbsp;&#8211; dump all active directory before start. In case [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[6838,737,6321,6052,6325],"class_list":["post-33798","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-adspider","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ADSpider : Advanced Real-Time Monitoring Of Active Directory<\/title>\n<meta name=\"description\" content=\"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/adspider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ADSpider : Advanced Real-Time Monitoring Of Active Directory\" \/>\n<meta property=\"og:description\" content=\"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/adspider\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T05:10:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T05:10:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes\",\"datePublished\":\"2024-07-12T05:10:32+00:00\",\"dateModified\":\"2024-07-12T05:10:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/\"},\"wordCount\":214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\",\"keywords\":[\"ADSpider\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/adspider\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/adspider\/\",\"name\":\"ADSpider : Advanced Real-Time Monitoring Of Active Directory\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\",\"datePublished\":\"2024-07-12T05:10:32+00:00\",\"dateModified\":\"2024-07-12T05:10:34+00:00\",\"description\":\"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/adspider\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ADSpider : Advanced Real-Time Monitoring Of Active Directory","description":"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/adspider\/","og_locale":"en_US","og_type":"article","og_title":"ADSpider : Advanced Real-Time Monitoring Of Active Directory","og_description":"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update","og_url":"https:\/\/kalilinuxtutorials.com\/adspider\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-12T05:10:32+00:00","article_modified_time":"2024-07-12T05:10:34+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/adspider\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/adspider\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes","datePublished":"2024-07-12T05:10:32+00:00","dateModified":"2024-07-12T05:10:34+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/adspider\/"},"wordCount":214,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","keywords":["ADSpider","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/adspider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/adspider\/","url":"https:\/\/kalilinuxtutorials.com\/adspider\/","name":"ADSpider : Advanced Real-Time Monitoring Of Active Directory","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","datePublished":"2024-07-12T05:10:32+00:00","dateModified":"2024-07-12T05:10:34+00:00","description":"Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata and Update","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/adspider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/adspider\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicr75N7KcCtSzCkpO-g-z_I1xrwLr24Xr5dmNTXkeaFkbPFqEjeqLG5En489iu-VBC4ZHjBaCnmrekiYYAHvk8DX-qa9PDuPkeu1jcwckrifA1LLXn5mNlTwxvrkHxyHupDp3asf-aPuRCrdT3NCNAEtPtWP-fBO3aDFQOBIrGNEK9qJVtZ0p0s2nsCWlK\/s16000\/ADSpider%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35454,"url":"https:\/\/kalilinuxtutorials.com\/gpohunter\/","url_meta":{"origin":33798,"position":0},"title":"GPOHunter &#8211; Active Directory Group Policy Security Analyzer","author":"Varshini","date":"December 16, 2024","format":false,"excerpt":"GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory Group Policy Objects (GPOs). It automates security checks and provides detailed reports on potential vulnerabilities, helping administrators secure their environments. Features Connects to Active Directory using LDAP\/LDAPS protocols. Supports NTLM authentication and Pass-the-Hash techniques. Analyzes\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4ldwrakRXbaKSXLqa9LxABBfbbzKvwweA2B7uKUIkao83eZ8SAlGlSgIoV4zhLlgvRjvL3k0CWFBrK2Y98lpA0hy5Ksy6YAJqPVowhR5BUHz0CgCNROPLtDghIK0Yw7o_YNdkK77lr9AsMeBVv-2QK8P5mA4i2VAzPxtirZnOxtHG1MqUZFwvXXMl3puk\/s1600\/GPOHunter%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9528,"url":"https:\/\/kalilinuxtutorials.com\/badblood\/","url_meta":{"origin":33798,"position":1},"title":"BadBlood : Microsoft Active Directory Domain With A Structure","author":"R K","date":"March 4, 2020","format":false,"excerpt":"BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26460,"url":"https:\/\/kalilinuxtutorials.com\/silenthound\/","url_meta":{"origin":33798,"position":2},"title":"SilentHound : Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.","author":"R K","date":"August 16, 2022","format":false,"excerpt":"SilentHound Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc. Created by\u00a0Nick Swink\u00a0from\u00a0Layer 8 Security. Installation Using pipenv (recommended method) sudo python3 -m pip install --user pipenvgit clone https:\/\/github.com\/layer8secure\/SilentHound.gitcd silenthoundpipenv install From requirements.txt (legacy) \u00a0This method is not recommended because python-ldap can cause many dependency errors.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31245,"url":"https:\/\/kalilinuxtutorials.com\/ldeep\/","url_meta":{"origin":33798,"position":3},"title":"Install And Secure &#8211; A Guide To Using &#8216;ldeep&#8217; With Kerberos For Advanced Active Directory Analysis","author":"Varshini","date":"November 9, 2023","format":false,"excerpt":"In the realm of network security and Active Directory assessment, efficient reconnaissance is paramount. This article explores the installation and utilization of 'ldeep,' a powerful tool equipped with Kerberos authentication for advanced Active Directory analysis. Learn how to enhance your network security and streamline your reconnaissance efforts using this comprehensive\u2026","rel":"","context":"In &quot;Information Gathering&quot;","block_context":{"text":"Information Gathering","link":"https:\/\/kalilinuxtutorials.com\/category\/ig\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl_UY6OXvxbNt17UZ_LErmyL295qsYZk7ueXW57DfAxz5MBXjRIHzllzzCqMS-zjNwxdxIvX0GSfah-dgtYxQNomrZdof1Qq5lTa4jWtdeOaLplCI-IWfXVeei8vZym9ociJ4joCV1-G24cog2MfDCrP2On2Vj31ILDv2Ws0JSZQ0PxbhP3-uMbe6yMw\/s16000\/Ideep.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl_UY6OXvxbNt17UZ_LErmyL295qsYZk7ueXW57DfAxz5MBXjRIHzllzzCqMS-zjNwxdxIvX0GSfah-dgtYxQNomrZdof1Qq5lTa4jWtdeOaLplCI-IWfXVeei8vZym9ociJ4joCV1-G24cog2MfDCrP2On2Vj31ILDv2Ws0JSZQ0PxbhP3-uMbe6yMw\/s16000\/Ideep.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl_UY6OXvxbNt17UZ_LErmyL295qsYZk7ueXW57DfAxz5MBXjRIHzllzzCqMS-zjNwxdxIvX0GSfah-dgtYxQNomrZdof1Qq5lTa4jWtdeOaLplCI-IWfXVeei8vZym9ociJ4joCV1-G24cog2MfDCrP2On2Vj31ILDv2Ws0JSZQ0PxbhP3-uMbe6yMw\/s16000\/Ideep.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjl_UY6OXvxbNt17UZ_LErmyL295qsYZk7ueXW57DfAxz5MBXjRIHzllzzCqMS-zjNwxdxIvX0GSfah-dgtYxQNomrZdof1Qq5lTa4jWtdeOaLplCI-IWfXVeei8vZym9ociJ4joCV1-G24cog2MfDCrP2On2Vj31ILDv2Ws0JSZQ0PxbhP3-uMbe6yMw\/s16000\/Ideep.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6310,"url":"https:\/\/kalilinuxtutorials.com\/ldapdomaindump-active-directory-ldap\/","url_meta":{"origin":33798,"position":4},"title":"LdapDomainDump : Active Directory Information Dumper via LDAP","author":"R K","date":"August 26, 2019","format":false,"excerpt":"LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved via LDAP by any authenticated user (or machine). This makes LDAP an interesting protocol for gathering information in the recon phase of a pentest of an internal network.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":20398,"url":"https:\/\/kalilinuxtutorials.com\/adlab\/","url_meta":{"origin":33798,"position":5},"title":"ADLab : Custom PowerShell Module To Setup An Active Directory Lab Environment To Practice Penetration Testing","author":"R K","date":"November 22, 2021","format":false,"excerpt":"ADLab, the purpose of this module is to automate the deployment of an Active Directory lab for practicing internal penetration testing. Credits to\u00a0Joe Helle\u00a0and his\u00a0PowerShell for Pentesters course\u00a0regarding the generation of the attack vectors. Instructions Preparation Optional but recommended: Move Module into\u00a0PSModulePath # Display PSModulePath$env:PSModulePath.split(\";\")# Move module to pathMove-Item .\\ADLab\\\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjNfkYIgDrPsEwLbjzv3lDTNKbl0I9z3PA0a42dx482izJ8Rcs9Jp_JKJQGmQ_RbqnrO6-il40OKeOWpk9A-K8jYW6sbqORQqhTQSTkFXX8SXou5JgebqJcSxvBvpE0yp5v24vdh30RnS-7iBX0OXCQzRUJMlk_6tio6GjEy8C6FL9o9tpm4QxDwgGH=s676","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjNfkYIgDrPsEwLbjzv3lDTNKbl0I9z3PA0a42dx482izJ8Rcs9Jp_JKJQGmQ_RbqnrO6-il40OKeOWpk9A-K8jYW6sbqORQqhTQSTkFXX8SXou5JgebqJcSxvBvpE0yp5v24vdh30RnS-7iBX0OXCQzRUJMlk_6tio6GjEy8C6FL9o9tpm4QxDwgGH=s676 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjNfkYIgDrPsEwLbjzv3lDTNKbl0I9z3PA0a42dx482izJ8Rcs9Jp_JKJQGmQ_RbqnrO6-il40OKeOWpk9A-K8jYW6sbqORQqhTQSTkFXX8SXou5JgebqJcSxvBvpE0yp5v24vdh30RnS-7iBX0OXCQzRUJMlk_6tio6GjEy8C6FL9o9tpm4QxDwgGH=s676 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33798"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33798\/revisions"}],"predecessor-version":[{"id":33801,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33798\/revisions\/33801"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33802"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}