logo

Joe Dibley

Security Researcher at Netwrix and member of the Netwrix Security Research Team. Joe is an expert in Active Directory, Windows, and a wide variety of enterprise software platforms and technologies, Joe researches new security risks, complex attack techniques, and associated mitigations and detections.
Identity
August 13, 2024

NIST Password Guidelines

The National Institute of Standards and Technology (NIST) helps organizations implement best practices across their operations, including cybersecurity. In particular, NIST password guidelines...
Infrastructure
August 14, 2023

Windows Remote WMI Security Primer for the Faint-Hearted

Local WMI querying is straightforward to implement and troubleshoot — but remote WMI querying is another story. Indeed, setting up secure remote WMI querying for a user with no admin rights...
Identity
August 14, 2023

Common Hacker Tools that Complement Mimikatz

Mimikatz is a popular post-exploitation tool that hackers use for lateral movement and privilege escalation. While Mimikatz is quite powerful, it does have some important limitations: It...
Cybersecurity
May 5, 2023

How to Clean Up Your Active Directory

Despite the popularity of the cloud, Microsoft Active Directory (AD) remains a crucial component of the IT infrastructure for many organizations. Indeed, Active Directory often serves as the central...
Cybersecurity
April 21, 2023

Attacking Constrained Delegation to Elevate Access

This article rounds out a series of articles on Kerberos delegation. Before reading it, we suggest making sure you are familiar with both Active Directory delegation and Kerberos delegation, and...
Identity
April 7, 2023

How to Restore Active Directory Object Attributes

Active Directory (AD) is a database and set of services that offers centralized management of IT infrastructure resources. It connects users with the resources they require to get their work done....
Show more articles