Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Hunting backdoors in Active Directory Environment

Автор: SANS Digital Forensics and Incident Response

Загружено: 2021-11-02

Просмотров: 4433

Описание:

We conducted multiple investigations and assessments, observed techniques that attackers preferred as they conducted privilege escalation to move laterally, persist in the Active Directory environment, and blend in. Backdoors and misconfigurations on Active directory systems provided attackers with long term privileged access to the environment.

We will cover, in depth, different methods used by attackers to maintain persistence, covertly elevate privileges at will, and maintain and exert control over systems managed by Active Directory. We will talk about different methods of hunting and detecting for misconfigurations and backdoors to help find these faster and respond effectively.

Some of the hunt use cases that may be discussed include:

Hybrid Active Directory Backdoors
DACL Based Backdoors
Delegation Misuse
GPO based Backdoors
SID History Abuse
Misconfigurations of Authentication Methods
Persistent access using Machine Account password

Thirumalai Natarajan Muthiah, Principal Consultant, Mandiant -   / th1rum  
Anurag Khanna, Manager - Incident Response & Consulting Services, Crowdstrike Services -   / khannaanurag  

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE
#ThreatHuntingSummit #ActiveDirectory

Hunting backdoors in Active Directory Environment

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Hunting Malicious Office Macros

Hunting Malicious Office Macros

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

[Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory

Hunting Beacon Activity with Fourier Transforms

Hunting Beacon Activity with Fourier Transforms

Threat Hunting in Active Directory Environment

Threat Hunting in Active Directory Environment

Building an Incident Response Playbook on the Fly Against Scattered Spider Lateral Movement

Building an Incident Response Playbook on the Fly Against Scattered Spider Lateral Movement

Как мы используем Active Directory на работе | Реальный мир | Лучшие практики и советы

Как мы используем Active Directory на работе | Реальный мир | Лучшие практики и советы

Common misconceptions and mistakes made in Threat Hunting

Common misconceptions and mistakes made in Threat Hunting

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

Hunting and Scoping A Ransomware Attack

Hunting and Scoping A Ransomware Attack

Beyond the Mcse: Active Directory for the Security Professional

Beyond the Mcse: Active Directory for the Security Professional

Понимание доменов, деревьев и леса Active Directory

Понимание доменов, деревьев и леса Active Directory

Keynote: Threat Hunting: Old Data, New Tricks!

Keynote: Threat Hunting: Old Data, New Tricks!

Hunting for Active Directory Persistence

Hunting for Active Directory Persistence

Threat Hunting in Microsoft 365 Environment

Threat Hunting in Microsoft 365 Environment

Ex-OpenAI Scientist WARNS:

Ex-OpenAI Scientist WARNS: "You Have No Idea What's Coming"

Stay ahead of the game: automate your threat hunting workflows

Stay ahead of the game: automate your threat hunting workflows

Threat Hunting via DNS | SANS@MIC Talk

Threat Hunting via DNS | SANS@MIC Talk

Top Active Directory Attacks: Understand, then Prevent and Detect

Top Active Directory Attacks: Understand, then Prevent and Detect

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

Finding and Decoding Malicious Powershell Scripts - SANS DFIR Summit 2018

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com