Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
IDENTITY & ACCESS ANALYSIS · PRIVILEGE ESCALATION DETECTION · LATERAL MOVEMENT PATHS

One compromised identity.Unlimited blast radius.Spakto maps every path.

Spakto continuously analyzes how users, service accounts, IAM roles, tokens, and trust relationships combine into real privilege escalation and lateral movement paths — surfacing the identity exposures that create your highest-risk attack chains.

Identity Attack Path Analysis

IAM policies look safe.
Attack paths are not.

Compliance audits validate policies in isolation. Attackers chain them together. Spakto maps the full identity graph — finding the paths through your environment that no IAM review or permission audit can surface.

IAM Compliance Audit StreamPOLICY VIEW
2 critical paths missed — compliant on all 247 policy checks
Spakto — Identity Attack GraphCLICK NODES TO TRACE PATH
john.devDomain Usersvc-deployService AccountIAM:PowerUserAWS Roleprod-rds-adminDB Admin GroupCROWN JEWELProduction DatabaseIdentity Attack Path — Click to trace →
4
Identity Hops
94
Path Risk Score
2,847
Assets at Risk
Identity Surface Coverage

Every identity surface.
Continuously mapped.

Identity doesn't live in one place. Spakto ingests and correlates across all six identity surfaces — finding the cross-domain chains that siloed tools always miss.

Active Directory2,847 PRINCIPALS

Full AD object graph: users, groups, OUs, GPOs, trust relationships, and delegation chains — including nested memberships and shadow admins.

Users & Security Groups
Nested memberships, AdminSDHolder, shadow admins
GPO Attack Paths
GPO → OU → computer → local admin chains
Kerberos SPNs
Roastable service accounts, delegation flags
AD Trust Relationships
Forest trusts, SID history, domain bridges
DACL / ACE Analysis
GenericAll, WriteDACL, DCSync rights mapping
10,165 total identity principals modeled across 6 surfaces — relationships updated in real-time as configuration changes
Identity Attack Patterns

How attackers actually
abuse identity.

Not theoretical CVEs — these are the five real attack chains Spakto finds in production environments. Each pattern is mapped to live configuration, not compliance checkboxes.

KerberoastingAny domain user → service account hash → privilege escalation
MITRE T1558.003RISK: 92/100
Attack Chain — Step by Step
1
Domain user requests TGS
Any authenticated user requests a Kerberos service ticket for an SPN
2
TGS encrypted with SPN key
Ticket encrypted with the service account's NTLM hash — extractable offline
3
Offline hash cracking
Attacker cracks RC4/AES ticket offline with Hashcat or JtR
4
Service account compromise
Cleartext credentials recovered for svc-deploy, svc-backup, or svc-sql
5
Escalation via SPN privilege
Service account used to pivot to constrained delegation targets or DB access
Path Risk Score92/100
iaa — kerberoast
How It Works

How Spakto maps
identity attack paths.

Step 1 of 4

Ingest

Connect to every identity data source

  • Connects to AD / LDAP with read-only LDAP bind — no agent required
  • Pulls Entra ID via Microsoft Graph API (read-only service principal)
  • Ingests AWS IAM via read-only ListRoles, GetPolicy — no write permissions
  • Connects K8s via cluster read-only SA token for RBAC resource enumeration
iaa — step-1-ingest
Spakto vs IAM Audits

Compliance checks policies.
We test how attackers use them.

An IAM audit can score 91/100 while leaving four critical attack paths open. Compliance measures control existence — Spakto measures control effectiveness against real adversaries.

IAM Access Review — Policy Check FeedCOMPLIANCE VIEW
Score: 91/100 — COMPLIANT4 critical attack paths not visible
Spakto — Identity Attack Path FindingsATTACK VIEW
Analyzing identity graph...
Capability
IAM Audit
Spakto IAA
Detects exploitable attack paths
❌ No — evaluates policies in isolation
✓ Yes — traverses all cross-domain chains
Cross-domain identity correlation
❌ Single-directory scope only
✓ AD + Azure AD + AWS + K8s + SaaS
Shadow admin detection
❌ DACL analysis not included
✓ Full ACE/DACL graph traversal
Kerberoast / delegation analysis
❌ Not in scope for IAM audits
✓ SPN scanning, delegation flag mapping
Policy compliance scoring
✓ Full SOC2 / ISO 27001 mapping
✓ Compliance + attack path context
Use Cases

Who uses Identity
Attack Path Analysis.

From IAM teams hunting shadow admins to zero trust architects validating their perimeters — Spakto gives every identity security role the attacker's-eye view they've been missing.

Identity security teams use Spakto to move beyond policy reviews and find the exploitable chains that only become visible when identities are modeled as a graph — not a spreadsheet.

Key Capabilities
  • Continuous shadow admin detection across AD and Entra
  • Kerberoast and delegation abuse surface before red team engagement
  • Cross-domain privilege escalation chains ranked by blast radius
  • Remediation ordered by path elimination efficiency — not CVE score

We passed 4 IAM audits. Spakto found 12 shadow admins on day one. Those audits were checking the wrong thing.

IAM Security Lead, Financial Services

Outcomes
12
Shadow admins found
94%
Attack paths eliminated
−67%
Time to remediation
3
Audit findings remaining
SHADOW ADMIN PATH VISUALIZER · AD ACL GRAPH TRAVERSAL

Not a Domain Admin.
Three ACEs away from one.

Shadow admin paths exist in every Active Directory environment. Standard audits check direct group memberships — they miss multi-hop ACE chains through nested groups, GPO links, and object-level permissions that give low-privilege users a path to Domain Admin.

ID
ENTRY POINT · LOW RISK
j.chen (Developer)
Member of
1
j.chen
GenericWrite →
2
DL-DevTools
Linked to →
3
GPO-Software-Deploy
Contains →
4
Workstations OU
COMPROMISE
5
🎯 Domain Admins
Path Properties
Attack TypeShadow Admin
Starting Pointj.chen (Developer)
MITRE TIDT1484.001
Hop Count5
DetectableNo — standard audit miss
Why Audits Miss This

Standard AD auditing checks memberOf — it does not traverse multi-hop ACE chains.

Most SIEM rules alert on direct Domain Admins additions, not indirect permission chains.

GenericWrite, WriteDACL, and AllExtendedRights are not flagged as dangerous without graph traversal context.

PRIVILEGE ESCALATION SIMULATION · STEP-BY-STEP EXPLOIT REPLAY

Real commands. Real evidence.
Every PrivEsc step proven.

Not theoretical — for each privilege escalation path, Spakto produces the exact API calls, command output, and evidence an attacker would see. Run the simulation to replay the exploit chain step-by-step.

attacker@kali:~$ — Active Directory privilege escalation — T1558.003
IDLE
Click RUN EXPLOIT to begin the privilege escalation simulation…
IDENTITY RISK MATRIX · PRIVILEGE × EXPOSURE SCATTER PLOT

Every identity plotted by
privilege level and exposure score.

The matrix surfaces your riskiest identities instantly: those with high privilege AND high exposure are your most exploitable accounts. Filter by domain, hover any node for full risk context.

identity-risk-matrix — 15 identities shown
Critical
High
Medium
Low
00252550507575100100HIGH RISK ZONEExposure Score →Privilege Level ↑
Top Risk Identities
svc-backupAD89
lambda-exec-roleAWS81
svc-ci-deployAD72
ci-runnerGitHub69
admin-iam-userAWS65
terraform-saGCP65

Identity & Access Analysis FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question