{"id":2825,"date":"2012-10-18T13:23:06","date_gmt":"2012-10-18T12:23:06","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2012\/10\/18\/active-directory-password-auditing-2012\/"},"modified":"2025-07-24T12:54:47","modified_gmt":"2025-07-24T11:54:47","slug":"active-directory-password-auditing-2012","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/","title":{"rendered":"Active Directory Password Auditing (2012)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2825\" class=\"elementor elementor-2825\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ba4c45f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ba4c45f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-673fe55f\" data-id=\"673fe55f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25497c7a elementor-widget elementor-widget-text-editor\" data-id=\"25497c7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A customisable and straightforward how-to guide on password auditing during penetration testing and security auditing on Microsoft Active Directory accounts.<\/p>\n<p><strong>Update October 2016<\/strong>: A more recent guide can be found in a more recent blog post <a href=\"\/?p=2916\">here<\/a>.<\/p>\n<p>I do a lot of&nbsp;password auditing&nbsp;during penetration testing and security auditing, mostly on Windows Active Directory accounts. There are lots of different ways of doing this. The method I discuss here I have found to give consistently good and relatively quick results, as well as being relatively straightforward and easily extendable and customisable.<\/p>\n<p>First, the obligatory disclaimer. The tools used in the process are those which I have developed a personal preference for over the years, and are in no way intended as a tacit recommendation of any particular tools. On a related topic, I take no responsibility for any damage caused by the incorrect use of any of these tools, or the process discussed below. I assume a certain level of technical knowledge on your part, and I also assume that you have authorisation to perform the steps discussed below.<\/p>\n<p>So, disclaimers aside, you will require a few things before we begin. These are:<\/p>\n<p>\u2022 A &#8220;Domain Admin&#8221; or equivalent account for the systems you will be auditing.<br>\u2022 A designated auditing workstation \u2013 this should NOT be a domain controller or production server.<br>\u2022 The security testing tool Oxid Cain, downloadable from&nbsp;<a href=\"https:\/\/www.oxid.it\/cain.html\">https:\/\/www.oxid.it\/cain.html<\/a><br>\u2022 A password dictionary.<\/p>\n<p>There are a number of these available online, or you can create your own wordlist based on your organisation.<br>The dictionary should be all lowercase, and avoid number substitution, as Cain will modify the dictionary entries automatically.<br>Symbols (such as !@#?&lt;&gt; etc.) are ok, but ensure that you also have the non-symbol equivalents listed in the dictionary.<\/p>\n<p>Optionally, you can also utilise rainbow tables, however I would recommend that you understand the nature of Windows password hashing, before attempting to use these. Both rainbow tables and Window password hash mechanisms are discussed in the articles below:<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Rainbow_tables\">https:\/\/en.wikipedia.org\/wiki\/Rainbow_tables<\/a><br><a href=\"https:\/\/en.wikipedia.org\/wiki\/LM_hash\">https:\/\/en.wikipedia.org\/wiki\/LM_hash<\/a><br><a href=\"https:\/\/en.wikipedia.org\/wiki\/NTLM\">https:\/\/en.wikipedia.org\/wiki\/NTLM<\/a><\/p>\n<p>Please note that Oxid Cain, and its related service Able, are flagged by most anti-virus and anti-malware solutions as malicious software. As such, you may need to configure exceptions for these, however I would strongly advise that this is not set up as a blanket rule and is only configured on the specific auditing workstation, and on a target domain controller for only as long as is needed to perform steps 8 to 12 in Part 1, below.<\/p>\n<p><strong>Part 1 \u2013 Obtaining the Password Hashes<\/strong><\/p>\n<p>1) Download and install Oxid Cain on the designated auditing workstation.<\/p>\n<p>2) Open Cain, and ignore the firewall warning. The firewall setting will not affect what we are doing here.<\/p>\n<p>3) You should now be faced with the default Cain interface.<\/p>\n<p>4) For our purposes, we are interested in the &#8220;Network&#8221; tab and the &#8220;Quick List&#8221; node, so go ahead and open them.<br>Please note that some people prefer to use the &#8220;Microsoft Windows Network&#8221; node however I have had mixed-results with this, and find the &#8220;Quick List&#8221; to be more reliable.<\/p>\n<p>5) Right-click on &#8220;Quick List&#8221; and choose &#8220;Add to Quick List&#8221;, then enter the name or IP address of your target system, for our purposes, this is a domain controller.<\/p>\n<p>6) The system, indicated by IP address will now appear in the &#8220;Quick List&#8221;. Right-click on it, and choose &#8220;Connect As&#8221;, and then enter the credentials of the &#8220;Domain Admin&#8221; equivalent account. Please note that you may need to enter the username in full domain syntax \u2013 e.g. &#8220;<a href=\"mailto:domainadmin@mydomain.local\">domainadmin@mydomain.local<\/a>&#8220;.<\/p>\n<p>7) Assuming that the connection is successful, you should now be able to expand the system node, and select the &#8220;Services&#8221; node.<\/p>\n<p>8) Right-click on &#8220;Services&#8221; and choose &#8220;Install Abel&#8221;. This will attempt to upload, and start the &#8220;Able&#8221; service on the target system.<br>The most common reason for this failing is due to anti-virus or anti-malware protection filtering it.<\/p>\n<p>9) Assuming that the service uploads and starts successfully, double-click on the system node TWICE, to close and then re-open the node. This will cause the tree to refresh, and it should now show the &#8220;Abel&#8221; node.<\/p>\n<p>10) Expand the &#8220;Abel&#8221; node and select &#8220;Hashes&#8221;. This will attempt to extract the password hashes from Active Directory. Normally, you will not need to extract the password history for a straightforward password audit. You should now be presented with a screen showing something like this:<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">User Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; RID&nbsp;&nbsp; &lt; 8&nbsp;&nbsp;&nbsp; LanMan Hash&nbsp;&nbsp;&nbsp; NT Hash<br>Administrator&nbsp; 500&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AAD3B43...&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 31D6CFE...<\/code><\/div>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(255, 255, 255);\">11) Right click the table, and choose &#8220;Send All To Cracker&#8221;.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(255, 255, 255);\">12) Go back to the &#8220;Services&#8221; Node, right-click on the &#8220;Able&#8221; service in the list, and choose &#8220;Remove&#8221;.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(255, 255, 255);\">This will stop, and remove the &#8220;Able&#8221; service from the target system.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(255, 255, 255);\">13) Right-click on the system node, and choose &#8220;Disconnect&#8221;.<\/p>\n<p style=\"margin: 0.5em 0px; font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(255, 255, 255);\"><u><b>Part 2 \u2013 Cracking the Hashes<\/b><\/u><\/p>\n<p>1) Choose the &#8220;Cracker&#8221; tab in Cain. This should show a table similar to that below:<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">User Name&nbsp;&nbsp;&nbsp;&nbsp; LM Password&nbsp;&nbsp; &lt; 8&nbsp;&nbsp;&nbsp; NT Password&nbsp;&nbsp;&nbsp;&nbsp; LM Hash<br>Administrator&nbsp;&nbsp; * empty *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; *&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AAD3B43...<\/code><\/div>\n<p>2) Active Directory stores password hashes for users and computers. We are not interested in the computer account password hashes, so remove them by right-clicking in the hashes window, and choosing &#8220;Remove Machine Accounts&#8221;.<\/p>\n<p>3) With the remaining hashes, right-click and choose &#8220;Select All&#8221;.<\/p>\n<p>4) Right-click again, and choose &#8220;Dictionary Attack&#8221; -&gt; &#8220;LM Hashes&#8221;.<\/p>\n<p>5) Import your password dictionary, leave the default options as they are for now \u2013 although as you get more familiar with password auditing you may wish to modify these, and then click &#8220;Start&#8221;. This will likely take a while.<\/p>\n<p>6) Once this process has finished, and you have hopefully cracked some passwords, click on &#8220;Exit&#8221;. Then, right-click the password hashes list again, and this time choose &#8220;Dictionary Attack&#8221; -&gt; &#8220;NTLM Hashes&#8221;.<\/p>\n<p>7) Right-click the &#8220;Dictionary&#8221; list and choose &#8220;Reset all initial file positions&#8221;.<\/p>\n<p>8) Change the default options, selecting those listed below, and then hit &#8220;Start&#8221;. This could take a VERY long time, so be patient.<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">As Is (Password)<br>Reverse (PASSWORD \u2013 DROWSSAP)<br>Double (Pass \u2013 PassPass)<br>Lowercase (PASSWORD \u2013 password)<br>Num. sub. Perms (Pass,P4ss,Pa5s,...P45s...P455)<br>Case perms (Pass,pAss,paSs,...PaSs,...PASS)<br>To numbers Hybrid Brute (Pass0...Pass99)<\/code><\/div>\n<p>9) Once the process is completed, and you hopefully have some more cracked passwords, click &#8220;Exit&#8221;, and then you should be faced with a long list of users, some with cracked passwords and some without.<\/p>\n<p>10) At this point it is advised to close Cain, and take a copy of the raw data file, which contains the usernames, passwords, and password hashes as a &#8220;TAB&#8221; delimited list, before you do anything else. The file is located at the following path by default, although it may be different on your system:<\/p>\n<div class=\"codeblock\" style=\"padding: 5px; border: 1px solid rgb(204, 204, 204); font-family: frutiger-lt-45-light1, Verdana, Geneva, Arial, helvetica, sans-serif; font-size: 14px; line-height: 24px; background-color: rgb(238, 238, 238);\"><code style=\"font-family: 'Courier New', 'DejaVu Sans Mono', monospace, sans-serif; font-size: 1em; line-height: 1.5em;\">C:\\Program Files (x86)\\Cain\\lmnt.lst<\/code><\/div>\n<p>11) Re-open Cain, or import the lmnt.lst into a spreadsheet, then review the passwords as required.<\/p><p><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A customisable and straightforward how-to guide on password auditing during penetration testing and security auditing on Microsoft Active Directory accounts. Update October 2016: A more recent guide can be found in a more recent blog post here. I do a lot of&nbsp;password auditing&nbsp;during penetration testing and security auditing, mostly on Windows Active Directory accounts. There [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9023,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[211],"class_list":["post-2825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-active_directory","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Active Directory Password Auditing (2012)<\/title>\n<meta name=\"description\" content=\"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Active Directory Password Auditing (2012)\" \/>\n<meta property=\"og:description\" content=\"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-18T12:23:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T11:54:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Active Directory Password Auditing (2012)\",\"datePublished\":\"2012-10-18T12:23:06+00:00\",\"dateModified\":\"2025-07-24T11:54:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/passwordd.webp?fit=1200%2C800&ssl=1\",\"keywords\":[\"active directory\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/\",\"name\":\"Active Directory Password Auditing (2012)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/passwordd.webp?fit=1200%2C800&ssl=1\",\"datePublished\":\"2012-10-18T12:23:06+00:00\",\"dateModified\":\"2025-07-24T11:54:47+00:00\",\"description\":\"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/passwordd.webp?fit=1200%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/passwordd.webp?fit=1200%2C800&ssl=1\",\"width\":1200,\"height\":800,\"caption\":\"Password\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/active-directory-password-auditing-2012\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Active Directory Password Auditing (2012)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Active Directory Password Auditing (2012)","description":"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/","og_locale":"nl_NL","og_type":"article","og_title":"Active Directory Password Auditing (2012)","og_description":"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.","og_url":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2012-10-18T12:23:06+00:00","article_modified_time":"2025-07-24T11:54:47+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","type":"image\/webp"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Active Directory Password Auditing (2012)","datePublished":"2012-10-18T12:23:06+00:00","dateModified":"2025-07-24T11:54:47+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/"},"wordCount":1072,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","keywords":["active directory"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/","url":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/","name":"Active Directory Password Auditing (2012)","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","datePublished":"2012-10-18T12:23:06+00:00","dateModified":"2025-07-24T11:54:47+00:00","description":"Explore how auditing Active Directory passwords can uncover weak credentials and improve domain security through better password policies.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","width":1200,"height":800,"caption":"Password"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/active-directory-password-auditing-2012\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Active Directory Password Auditing (2012)"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/03\/passwordd.webp?fit=1200%2C800&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Jz","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2825\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/9023"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}