DiscoverBlack Hills Information SecurityWeaponizing Active Directory
Weaponizing Active Directory

Weaponizing Active Directory

Update: 2019-08-01
Share

Description

Download slides: https://www.activecountermeasures.com/presentations
0:54 Background behind this webcast, what and why
7:02 Creating resources in Active Directory, User accounts, Groups, and Dummy Computer accounts
18:54 Tools, ResponderGuard, General flow of attacks, reconnaissance, deception and planted credentials
38:12 Password Spraying, honey users, kerbroast, and multicast DNS poisoning
47:20 Detection with CredDefense Kit, ResponderGuard, ResponderGuard Agent, and SQL Server abuse attacks
53:43 Q&A and Closing Thoughts

The 2019 Verizon DBIR indicates that over 50% of all breaches take a month or more to detect.

This webcast covers basic techniques to catch attackers attempting lateral movement and privilege escalation within your environment with the goal of reducing that Mean Time to Detect (MTTD) metric.

Using tactical deception, we will lay out strategies to increase the odds that an attacker will give away their presence early after initial compromise.

Join David Fletcher, BHIS tester, SANS instructor, an amazing presenter, for this Black Hills Webcast.
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Weaponizing Active Directory

Weaponizing Active Directory

Black Hills Information Security