<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://0xdarknighthacks.ayedialaa.org/</id><title>DarknightHacks</title><subtitle>Personal Blog documenting my Hacking Journey: CTF writeups, tool notes, Hacking methodology and mindset, exploits and red team tactics.</subtitle> <updated>2026-05-09T17:57:30+01:00</updated> <author> <name>Alaa Eddine Ayedi</name> <uri>https://0xdarknighthacks.ayedialaa.org/</uri> </author><link rel="self" type="application/atom+xml" href="https://0xdarknighthacks.ayedialaa.org/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://0xdarknighthacks.ayedialaa.org/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Alaa Eddine Ayedi </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Microsoft Defender for Identity Deep Dive — Part 3: XDR Investigation, Hunting, and Response</title><link href="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part3/" rel="alternate" type="text/html" title="Microsoft Defender for Identity Deep Dive — Part 3: XDR Investigation, Hunting, and Response" /><published>2026-05-09T00:00:00+01:00</published> <updated>2026-05-09T00:00:00+01:00</updated> <id>https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part3/</id> <content type="text/html" src="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part3/" /> <author> <name>Alaa Eddine Ayedi</name> </author> <category term="microsoft-defender-xdr" /> <category term="identity-security" /> <summary>Microsoft Defender for Identity Deep Dive — Part 3: XDR Investigation, Hunting, and Response In Part 1, we treated Microsoft Defender for Identity as an identity telemetry engine. In Part 2, we looked at how MDI detections actually work: deterministic detections, behavioral baselines, thresholds, false positives, and detection limits. Now we move to the part that matters most in production: ...</summary> </entry> <entry><title>Microsoft Defender for Identity Deep Dive — Part 2: Detection Logic, Baselines, and Limits</title><link href="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part2/" rel="alternate" type="text/html" title="Microsoft Defender for Identity Deep Dive — Part 2: Detection Logic, Baselines, and Limits" /><published>2026-04-08T00:00:00+01:00</published> <updated>2026-04-08T00:00:00+01:00</updated> <id>https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part2/</id> <content type="text/html" src="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part2/" /> <author> <name>Alaa Eddine Ayedi</name> </author> <category term="microsoft-defender-xdr" /> <category term="identity-security" /> <summary>Microsoft Defender for Identity Deep Dive — Part 2: Detection Logic, Baselines, and Limits In Part 1, we looked at Microsoft Defender for Identity from an architectural perspective. The main point was simple: MDI is not just an AD alerting tool. It is the on-premises and hybrid identity signal engine inside Microsoft Defender XDR. That distinction matters even more when we start talking...</summary> </entry> <entry><title>Microsoft Defender for Identity Deep Dive — Part 1: Architecture, Sensors, and Identity Telemetry</title><link href="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part1/" rel="alternate" type="text/html" title="Microsoft Defender for Identity Deep Dive — Part 1: Architecture, Sensors, and Identity Telemetry" /><published>2026-04-01T00:00:00+01:00</published> <updated>2026-05-09T14:29:55+01:00</updated> <id>https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part1/</id> <content type="text/html" src="https://0xdarknighthacks.ayedialaa.org/posts/MDI-Deep-Dive-Part1/" /> <author> <name>Alaa Eddine Ayedi</name> </author> <category term="microsoft-defender-xdr" /> <category term="identity-security" /> <summary>Microsoft Defender for Identity Deep Dive — Part 1: Architecture, Sensors, and Identity Telemetry Microsoft Defender for Identity is often introduced as a tool that detects attacks against Active Directory. That description is not wrong, but it is incomplete. In real Microsoft Defender XDR environments, MDI should be understood as the on-premises and hybrid identity signal engine. Its job is...</summary> </entry> <entry><title>Active Directory Domains and Trusts (Concepts, Types, and Secure Configuration)</title><link href="https://0xdarknighthacks.ayedialaa.org/posts/active-directory-domains-and-trusts/" rel="alternate" type="text/html" title="Active Directory Domains and Trusts (Concepts, Types, and Secure Configuration)" /><published>2026-02-04T00:00:00+01:00</published> <updated>2026-02-04T00:00:00+01:00</updated> <id>https://0xdarknighthacks.ayedialaa.org/posts/active-directory-domains-and-trusts/</id> <content type="text/html" src="https://0xdarknighthacks.ayedialaa.org/posts/active-directory-domains-and-trusts/" /> <author> <name>Alaa Eddine Ayedi</name> </author> <category term="windows server" /> <category term="active directory" /> <category term="domains and trusts" /> <category term="DNS" /> <summary>AD Domains and Trusts Active Directory (AD) domains are logical groupings of users, computers, and other network resources that simplify management and improve security within an organization. These domains act as containers, organizing resources based on policies, permissions, and administrative boundaries. Trusts are connections established between different domains, enabling them to commun...</summary> </entry> <entry><title>Configuring DNSSEC on Windows Server</title><link href="https://0xdarknighthacks.ayedialaa.org/posts/DNS-server-security-using-DNSSEC/" rel="alternate" type="text/html" title="Configuring DNSSEC on Windows Server" /><published>2026-02-03T00:00:00+01:00</published> <updated>2026-02-04T12:41:22+01:00</updated> <id>https://0xdarknighthacks.ayedialaa.org/posts/DNS-server-security-using-DNSSEC/</id> <content type="text/html" src="https://0xdarknighthacks.ayedialaa.org/posts/DNS-server-security-using-DNSSEC/" /> <author> <name>Alaa Eddine Ayedi</name> </author> <category term="windows server" /> <category term="active directory" /> <category term="DNS" /> <category term="server hardening" /> <summary>Introduction DNS is a foundational service in any Windows-based infrastructure, but by design it does not provide authentication or integrity protection. This makes it vulnerable to attacks such as DNS spoofing, cache poisoning, and man-in-the-middle manipulation. DNS Security Extensions (DNSSEC) address these weaknesses by allowing DNS responses to be cryptographically validated, ensuring th...</summary> </entry> </feed>
