Cable - A Post-Exploitation Toolkit For Active Directory Reconnaissance

For security teams conducting authorized assessments, Cable represents a significant addition to the Active Directory testing toolkit, offering a comprehensive suite of reconnaissance and exploitation modules in a single, well-documented framework. Security researchers and penetration testers have a powerful new tool in their arsenal with the recent development of Cable, an advanced post-exploitation toolkit designed specifically for Active Directory environments. Cable operates as a modular command-line tool that enables security professionals to thoroughly assess Active Directory security postures after initial access has been achieved. The toolkit is published under the GPL-3.0 license, making it freely available for security professionals to use in authorized penetration testing and security assessment activities. Created by developer Logan Goins, this .NET-based utility provides comprehensive capabilities for reconnaissance and exploitation of Discretionary Access Control List (DACL) vulnerabilities within enterprise networks. The developer notes that the tool serves both as a learning project and as a means to expand knowledge of “Active Directory focused offensive security”.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 10 Apr 2025 13:40:14 +0000


Cyber News related to Cable - A Post-Exploitation Toolkit For Active Directory Reconnaissance

Top 10 Best Active Directory Management Tools in 2025 - SolarWinds Access Rights Manager (ARM) is a robust Active Directory management tool designed to enhance security and simplify user permissions management. Dameware Remote Everywhere (DRE) is a powerful Active Directory management tool that provides ...
2 weeks ago Cybersecuritynews.com
Cable - A Post-Exploitation Toolkit For Active Directory Reconnaissance - For security teams conducting authorized assessments, Cable represents a significant addition to the Active Directory testing toolkit, offering a comprehensive suite of reconnaissance and exploitation modules in a single, well-documented framework. ...
1 week ago Cybersecuritynews.com
Avoid high cyber insurance costs by improving Active Directory security - Insurance broker and risk advisor Marsh revealed that US cyber insurance premiums rose by an average of 11% in the first quarter of 2023, and Delinea reported that 67% of survey respondents said their cyber insurance costs increased between 50% and ...
1 year ago Bleepingcomputer.com
Five Eyes Agencies Put Focus on Active Directory Threats - Security Boulevard - Cybersecurity agencies in the United States and other countries are urging organizations to harden the security around Microsoft’s Active Director (AD) solution, which has become a prime target of hackers looking to compromise enterprise networks. ...
6 months ago Securityboulevard.com
How to manage a migration to Microsoft Entra ID - Microsoft Entra ID, formerly Azure Active Directory, is not a direct replacement for on-premises Active Directory due to feature gaps and alternative ways to perform similar identity and access management tasks. For some organizations, a move to ...
1 year ago Techtarget.com
Active Roles Wins 2025 Cybersecurity Excellence Award for Hybrid Active Directory Protection - One Identity, a leader in unified identity security, today announced that One Identity Active Roles has been named a winner in the Hybrid Active Directory Protection category of the 2025 Cybersecurity Excellence Awards. Their Unified Identity ...
3 weeks ago Cybersecuritynews.com
Active Directory Infiltration Methods Employed by Cybercriminals - Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft's Active Directory to gain unauthorized access. Active Directory is a central component in many organizations, making it a valuable target for attackers seeking ...
1 year ago Gbhackers.com
The Benefits of Using DCIM Software for Data Center Cable Management - One of the primary benefits of DCIM software is the enhanced visibility it provides into the physical infrastructure of a data center. This software creates detailed, accurate, and up-to-date maps of all the cabling and connections within the ...
1 year ago Securityboulevard.com
CVE-2017-2343 - The Integrated User Firewall (UserFW) feature was introduced in Junos OS version 12.1X47-D10 on the Juniper SRX Series devices to provide simple integration of user profiles on top of the existing firewall polices. As part of an internal security ...
5 years ago
Microsoft Incident Response lessons on preventing cloud identity compromise - Microsoft Incident Response is often engaged in cases where organizations have lost control of their Microsoft Entra ID tenant, due to a combination of misconfiguration, administrative oversight, exclusions to security policies, or insufficient ...
1 year ago Microsoft.com
CISA Updates Toolkit with Nine New Resources to Promote Public Safety Communications and Cyber Resiliency - The Cybersecurity and Infrastructure Security Agency collaborates with public safety, national security, and emergency preparedness communities to enhance seamless and secure communications to keep America safe, secure, and resilient. Any ...
11 months ago Cisa.gov
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
6 months ago Aws.amazon.com
Government Quash All Post Office Horizon Convictions - It comes after the government in July 2021 had promised to compensate those postmasters who had their Horizon-related convictions overturned. The Government said this week it has committed to making sure these convictions are overturned by the end of ...
1 year ago Silicon.co.uk
Full Fibre Arrives UK's Most Remote Inhabited Island - People living on Fair Isle, the UK's most geographically remote inhabited island, have received a significant connectivity improvement. Openreach has delivered to the islanders full fibre broadband, thanks in part to funding from the Scottish ...
1 year ago Silicon.co.uk
Adalanche: Open-source Active Directory ACL visualizer, explorer - Adalanche provides immediate insights into the permissions of users and groups within an Active Directory. It's an effective open-source tool for visualizing and investigating potential account, machine, or domain takeovers. It helps identify and ...
1 year ago Helpnetsecurity.com
CVE-2025-21634 - In the Linux kernel, the following vulnerability has been resolved: cgroup/cpuset: remove kernfs active break A warning was found: WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G RIP: ...
2 months ago Tenable.com
Post-Quantum Cryptography Alliance Launches to Advance Post-Quantum Cryptography - PRESS RELEASE. SAN FRANCISCO, Feb. 6, 2024 /PRNewswire/ - The Linux Foundation is excited to announce the launch of the Post-Quantum Cryptography Alliance, an open and collaborative initiative to drive the advancement and adoption of post-quantum ...
1 year ago Darkreading.com
Implementing Zero Trust Principles in Your Active Directory - In the past, many organizations relied on secure perimeters to trust users and devices. This approach is no longer viable with the geographical dispersion of workers and the need for access from various locations and devices. End-users now require ...
1 year ago Cysecurity.news
Type Juggling Leads to Two Vulnerabilities in POST SMTP Mailer WordPress Plugin - On December 14th, 2023, during our Bug Bounty Program Holiday Bug Extravaganza, we received a submission for an Authorization Bypass vulnerability in POST SMTP Mailer, a WordPress plugin with over 300,000+ active installations. This vulnerability ...
1 year ago Wordfence.com
Tech Giants Form Post-Quantum Cryptography Alliance - The Linux Foundation today announced the launch of the Post-Quantum Cryptography Alliance, an initiative to advance and drive the adoption of post-quantum cryptography. Founded by AWS, Cisco, IBM, IntellectEU, Nvidia, QuSecure, SandboxAQ, and the ...
1 year ago Securityweek.com
Microsoft: New RAT malware used for crypto theft, reconnaissance - Last but not least, Microsoft says StilachiRAT allows command execution and potential SOCKS-like proxying using commands from a command-and-control (C2) server to the infected devices, which can let the threat actors reboot the compromised system, ...
1 month ago Bleepingcomputer.com
750m Indian mobile subscribers' info for sale on dark web The Register - Asia In Brief Indian infosec firm CloudSEK last week claimed it found records describing 750 million Indian mobile network subscribers on the dark web, with two crime gangs offering the trove of data for just $3,000. CloudSEK named CYBO CREW ...
1 year ago Go.theregister.com
CVE-2024-26931 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
Taiwan charges Chinese ship captain with breaking subsea cables | The Record from Recorded Future News - Although Taiwan has been claimed by Beijing since the conclusion of the Chinese Civil War in 1949, it has been a self-governing territory throughout that period — moving from being a military dictatorship to becoming a multi-party democracy in the ...
3 days ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)