diff --git a/readme-images/goad-graph.png b/readme-images/goad-graph.png new file mode 100644 index 0000000..d0d0245 Binary files /dev/null and b/readme-images/goad-graph.png differ diff --git a/readme-images/teaser-graph.png b/readme-images/teaser-graph.png deleted file mode 100644 index e21af6f..0000000 Binary files a/readme-images/teaser-graph.png and /dev/null differ diff --git a/readme.MD b/readme.MD index cfe33d5..3128eb1 100644 --- a/readme.MD +++ b/readme.MD @@ -4,10 +4,9 @@ [![GitHub release (latest SemVer)](https://img.shields.io/github/v/release/lkarlslund/Adalanche)](https://github.com/lkarlslund/Adalanche/releases/latest) ![GitHub all releases](https://img.shields.io/github/downloads/lkarlslund/Adalanche/total) ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/lkarlslund/Adalanche/prerelease.yml?branch=master) +Sample Adalanche Graph using the GOAD lab Adalanche gives instant results, showing you what permissions users and groups have in an Active Directory. It is useful for visualizing and exploring who can take over accounts, machines or the entire domain, and can be used to find and show misconfigurations. - - ## I Can Haz Domain Admin? Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people are just added to Domain Admins. In large organizations you have a huge number of people with different needs, and they are delegated access to varying degrees of power in the AD. At some point in time, someone makes a mistake, and that can cost you dearly.