Active directory database snapshot via adexplorer

Intel Name: Active directory database snapshot via adexplorer

Date of Scan: July 15, 2025

Impact: Medium

Summary:
Detects the use of Sysinternals ADExplorer with the “-snapshot” flag to create a local copy of the Active Directory database. Attackers may leverage this snapshot to extract data for tools like BloodHound, gather usernames for password spraying, or exploit metadata for social engineering.

While the snapshot doesn’t include password hashes, some cases have revealed passwords stored in comment fields by administrators. This activity can indicate early reconnaissance or preparation for broader attacks.

More Details