Capacidades

Todos los checks que ejecuta ADscan, mapeados a MITRE ATT&CK.

46 entradas respaldadas por catálogo en 8 tácticas ATT&CK. 27 de ellas generan hallazgos en el informe técnico; el resto se muestran en el mapa de calor kill-chain y la matriz de cobertura cuando se observan.

generado 2026-05-02

Initial Access

2 checks

External Remote Services

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1133· External Remote Services

Exploit Public-Facing Application

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1190· Exploit Public-Facing Application

Persistence

2 checks

Force Change Password Rights Assigned

Core

The User-Force-Change-Password extended right in Active Directory allows a principal to reset another user's password without knowing the current password.

T1098· Account Manipulation· Permissions

Create Account

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1136· Create Account

Privilege Escalation

3 checks

noPac/sAMAccountName Spoofing (CVE-2021-42278 + CVE-2021-42287)

Crítico

NoPac chains two Active Directory vulnerabilities to achieve domain compromise from any standard domain user account.

T1068· Exploitation for Privilege Escalation· CVE

Domain Controller Accepts NTLMv1 Authentication

Alto

If the Domain Controller authenticates back using NTLMv1 during a coerced callback, the environment still permits a legacy NTLM mode with materially weaker cryptographic protections.

T1078· Valid Accounts· Authentication

Domain Admin Sessions on Non-Privileged Hosts

Alto

Domain Administrator sessions were discovered on workstations, member servers, or other non-Tier 0 hosts.

T1078.002· Domain Accounts· Privilege

Defense Evasion

3 checks

Obfuscated Files or Information

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1027· Obfuscated Files or Information

Indicator Removal

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1070· Indicator Removal

Hybrid Identity

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1556.007· Hybrid Identity

Credential Access

20 checks

OS Credential Dumping

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1003· OS Credential Dumping

LSASS Memory

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1003.001· LSASS Memory

DCSync Privilege Abuse

Crítico

The DCSync attack exploits Active Directory's directory replication protocol (MS-DRSR) to simulate the behavior of a Domain Controller requesting credential replication.

T1003.006· DCSync· Active Directory

LAPS Not Deployed on Domain Hosts (Posture)

Core

One or more domain-joined hosts do not have a managed local administrator password solution deployed.

T1078.003· Valid Accounts: Local Accounts· Posture/Hygiene

Password Guessing

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1110.001· Password Guessing

Password Spraying

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1110.003· Password Spraying

Resource-Based Constrained Delegation Misconfiguration

Alto

Resource-Based Constrained Delegation (RBCD) is a Kerberos mechanism configured via the msDS-AllowedToActOnBehalfOfOtherIdentity attribute on computer objects that controls which principals may impersonate users to that computer.

T1134.001· Access Token Manipulation: Token Impersonation/Theft· Delegation

WebDAV Coercion Attack Surface Detected

Core

WebDAV (Web Distributed Authoring and Versioning) support is enabled on detected hosts via the Windows WebClient service.

T1187· Forced Authentication· CVE

ZeroLogon (CVE-2020-1472)

Crítico

Zerologon (CVE-2020-1472, CVSS 10.0) is a cryptographic flaw in the Netlogon Remote Protocol (MS-NRPC) that allows an unauthenticated attacker to forge a valid Netlogon session with a Domain Controller.

T1210· Exploitation of Remote Services· CVE

Sensitive Data Found in SMB Shares

Alto

Files accessible over SMB shares were found to contain sensitive data such as plaintext credentials, API keys, private keys, or configuration artifacts that include authentication material.

T1552.001· Credentials in Files· SMB

GPP Autologin Credentials Exposed

Alto

Group Policy Preferences (GPP) support autologin configurations that store credentials in XML policy files under the SYSVOL share on Domain Controllers.

T1552.006· Group Policy Preferences· GPP

LAPS Password Readable by Non-Admins

Alto

The Local Administrator Password Solution (LAPS) stores per-machine local administrator credentials in the ms-Mcs-AdmPwd attribute of computer objects in Active Directory.

T1555· Credentials from Password Stores· LAPS

LDAP Signing / Channel Binding Not Hardened

Alto

When Domain Controllers do not require LDAP signing or do not enforce channel binding, attackers can relay coerced or captured NTLM authentication to LDAP and perform directory operations in the victim context.

T1557· Adversary-in-the-Middle· LDAP

LDAP Signing / Channel Binding Not Hardened

Alto

When Domain Controllers do not require LDAP signing or do not enforce channel binding, attackers can relay coerced or captured NTLM authentication to LDAP and perform directory operations in the victim context.

T1557.001· LLMNR/NBT-NS Poisoning + SMB Relay· LDAP

noPac/sAMAccountName Spoofing (CVE-2021-42278 + CVE-2021-42287)

Crítico

NoPac chains two Active Directory vulnerabilities to achieve domain compromise from any standard domain user account.

T1558· Steal or Forge Kerberos Tickets· CVE

KRBTGT Password Exposure Detected

Crítico

The KRBTGT account is the built-in service account used by the Kerberos Distribution Center (KDC) to encrypt and sign all Kerberos Ticket-Granting Tickets (TGTs) issued in the domain.

T1558.001· Steal or Forge Kerberos Tickets: Golden Ticket· Privilege

Kerberoasting

Core

In an Active Directory (AD) environment, Service Principal Names (SPNs) are used to uniquely identify instances of a Windows service.

T1558.003· Kerberoasting· Kerberos

AS-REP Roasting

Core

Preauthentication offers protection against offline Password Cracking.

T1558.004· AS-REP Roasting· Kerberos

Shadow Credentials (msDS-KeyCredentialLink) Present

Alto

One or more Active Directory objects have existing msDS-KeyCredentialLink attribute values.

T1606.002· Forge Web Credentials: SAML Tokens· Credential Access

ADCS ESC1 - Misconfigured Certificate Template

Crítico

ADCS ESC1 occurs when a certificate template is configured to allow requesters to specify a Subject Alternative Name (SAN) in their certificate request, combined with an authentication-capable Extended Key Usage (EKU) such as Client Authentication, Smart Card Logon, or PKINIT.

T1649· Steal or Forge Authentication Certificates· ADCS

Discovery

10 checks

Remote System Discovery

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1018· Remote System Discovery

Permission Groups Discovery

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1069· Permission Groups Discovery

Account Discovery

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1087· Account Discovery

LDAP Anonymous Bind Enabled

Core

Lightweight Directory Access Protocol (LDAP) supports anonymous bind operations, which permit unauthenticated clients to connect and query directory information from a Domain Controller without presenting any credentials.

T1087.002· Account Discovery: Domain Account· LDAP

Domain Trust Discovery

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1482· Domain Trust Discovery

Credentials Found in LDAP Attributes

Alto

Credential material (passwords, tokens, or similar secrets) was detected in cleartext LDAP attributes such as description, info, unixUserPassword, or userPassword.

· Credential Exposure

krbtgt Account Password Not Rotated

Alto

The krbtgt account password has not been changed in more than 180 days.

· Kerberos Security

Machine Account Quota Allows Domain Join

Core

The ms-DS-MachineAccountQuota attribute is set to a value greater than 0.

· Domain Configuration

Obsolete Operating Systems

Alto

One or more domain-joined systems appear to be running obsolete Windows versions identified through LDAP inventory.

· Asset Hygiene

RC4-Only Kerberos Accounts (No AES Support)

Core

One or more accounts do not have AES encryption types configured (msDS-SupportedEncryptionTypes bits 2-4 are all zero).

· Kerberos Security

Lateral Movement

5 checks

Remote Services: RDP

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1021.001· Remote Services: RDP

SMB Guest Session Share Access

Alto

One or more hosts accepted SMB guest session authentication and exposed accessible shares.

T1021.002· Remote Services: SMB/Windows Admin Shares· SMB

Pass the Hash

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1550.002· Pass the Hash

Pass the Ticket

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1550.003· Pass the Ticket

Lateral Tool Transfer

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1570· Lateral Tool Transfer

Impact

1 check

Data Encrypted for Impact

Soporte

ATT&CK technique surfaced by ADscan in the kill-chain heatmap and coverage matrix when observed in the target domain.

T1486· Data Encrypted for Impact
Matriz de Cobertura

¿Quieres esto mapeado a tu marco de cumplimiento?

Descarga la Matriz de Cobertura y el Playbook de Hardening de AD (vista previa). Cada técnica cruzada con ENS Alto, NIS2, DORA e ISO 27001:2022. Listo para aprovisionamiento, sin barrera de correo electrónico.

Capacidades — ADscan | ADscan