Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Hunting for Active Directory Persistence

Автор: SANS Digital Forensics and Incident Response

Загружено: 2022-11-23

Просмотров: 3351

Описание:

SANS DFIR Summit 2022

Speaker: Thomas Diot

For a few years now, Active Directory has been the preferred target of ransomware operators, and some APTs, to elevate privileges, maintain persistence, and execute malware at scale. Attackers had for instance obtained privileged Active Directory access in 95%+ of the IR on large perimeters handled by the CERT-W in 2021. As DFIR analysts, we are often asked to help reduce the risk of re-infection during Active Directory forest recovery. Uncovering and addressing Active Directory persistence is not an easy task, as numerous techniques can be leveraged by attackers to maintain persistence once a forest is compromised. In this talk, we will give a brief overview of a forest recovery procedure, and focus on unveiling different means of persistence, some well-known, other less so. Following the presentation, a (markdown) checklist and an associated PowerShell toolkit, that complement existing tooling, will be publicly released. The following Active Directory persistence techniques will be presented:

∙ Special privileges groups (Operators, Dns Admins, etc.)
∙ ACL based persistence on AdminSDHolder and other objects not protected by the SDProp mechanism
∙ DCSYnc and DCShadow minimal access rights persistence
∙ SID history persistence
∙ primaryGroupId persistence
∙ Golden and silver tickets persistence
∙ Kerberos (unconstrained, constrained, and resource-based constrained) delegations persistence
∙ Group Policy persistence (on GPO object and GPO files)
∙ ADCS and PKI related persistence (certificates, shadow credentials, User-Principal-Name / Alt-Security-Identities)

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Hunting for Active Directory Persistence

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Staying Ahead of the Game: Automate Your Threat Hunting Workflows

Staying Ahead of the Game: Automate Your Threat Hunting Workflows

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

Изучите Active Directory Kerberoasting

Изучите Active Directory Kerberoasting

Hunting backdoors in Active Directory Environment

Hunting backdoors in Active Directory Environment

Beyond the Mcse: Active Directory for the Security Professional

Beyond the Mcse: Active Directory for the Security Professional

Поиск угроз через Sysmon — саммит SANS Blue Team

Поиск угроз через Sysmon — саммит SANS Blue Team

Active Directory Enumeration With BloodHound

Active Directory Enumeration With BloodHound

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

SANS DFIR Webcast - Incident Response Event Log Analysis

SANS DFIR Webcast - Incident Response Event Log Analysis

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Analysis Paralysis? Setting the Right Goal for Your Incident Analysis

Обнаружение сетевых угроз стало проще (поиск хакеров)

Обнаружение сетевых угроз стало проще (поиск хакеров)

Как охотиться на опасных животных как профессионал: простой способ

Как охотиться на опасных животных как профессионал: простой способ

HIPConf23 - The Reality of Incident Response: Impact on identity and Active Directory

HIPConf23 - The Reality of Incident Response: Impact on identity and Active Directory

Top Active Directory Attacks: Understand, then Prevent and Detect

Top Active Directory Attacks: Understand, then Prevent and Detect

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

Threat Hunting in Active Directory Environment

Threat Hunting in Active Directory Environment

Изучите Microsoft Active Directory (ADDS) за 30 минут

Изучите Microsoft Active Directory (ADDS) за 30 минут

Exploiting Active Directory | TryHackMe - Offensive Security

Exploiting Active Directory | TryHackMe - Offensive Security

Extracting the unseen: Real-world RAM acquisition and analysis from Android devices

Extracting the unseen: Real-world RAM acquisition and analysis from Android devices

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com