
Rule Info
Name
Active Directory Database Snapshot Via ADExplorer
Author
Nasreddine Bencherchali (Nextron Systems)
Description
Detects the execution of Sysinternals ADExplorer with the "-snapshot" flag in order to save a local copy of the active directory database. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.
Date
2023-03-14 00:00:00
Modified
2025-07-09 00:00:00
Id
9212f354-7775-4e28-9c9f-8f0a4544e664
Tags
attack.discovery attack.t1087.002 attack.t1069.002 attack.t1482
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
phantinuss
Merge PR #5557 from @phantinuss - Bump pySigma-validators-sigmahq to 0.10
2025-08-14
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4700 from @nasbench - Promote older rules status from `experimental` to `test`
2024-02-01