{"version":"1.0","provider_name":"\uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45","provider_url":"https:\/\/hide01.ir","title":"\u062f\u0648\u0631\u0647 Advanced Attacks Against Active Directory","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gXMMN0XVtF\"><a href=\"https:\/\/hide01.ir\/advanced-attacks-against-active-directory\/\">\u062f\u0648\u0631\u0647 Advanced Attacks Against Active Directory<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/hide01.ir\/advanced-attacks-against-active-directory\/embed\/#?secret=gXMMN0XVtF\" width=\"600\" height=\"338\" title=\"&#8220;\u062f\u0648\u0631\u0647 Advanced Attacks Against Active Directory&#8221; &#8212; \uff28\uff49\uff44\uff45\uff3a\uff45\uff52\uff4f\uff2f\uff4e\uff45\" data-secret=\"gXMMN0XVtF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/hide01.ir\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/hide01.ir\/wp-content\/uploads\/2024\/03\/OIG2-2.jpeg","thumbnail_width":1024,"thumbnail_height":1024,"description":"The use of\u00a0Microsoft\u2019s Active Directory (AD)\u00a0remains very popular. It is\u00a0the core of nearly every organisation\u2019s network environment. While AD provides many benefits to organizations, one of the major drawbacks is the\u00a0potential for abuse by malicious parties.\u00a0 Cybercriminals have long targeted Active Directory (AD) as a valuable prize in their quest to gain full control over [&hellip;]"}