Главная
Study mode:
on
1
Intro
2
Roadmap
3
Doug Bienstock - @doughsec
4
Austin Baker - @bakedsec
5
Active Directory Federated Services
6
Building Blocks - Claims Pipeline
7
Building Blocks - Security Tokens
8
Building Blocks - claims to assertions
9
Building blocks - the RP
10
Identity Providers and Adapters
11
Finding AD FS Proxies
12
Target the Weak Links
13
Adapt or die
14
Windows Internal Database (WID)
15
Locating the goods
16
Decrypting the SigningToken
17
Key Derivation
18
Key Decryption
19
ADFSDump
20
ADFSpoof
21
Best Practices and Mitigations
22
Responding Appropriately
Description:
Explore the intricacies of Active Directory Federated Services (AD FS) and its potential vulnerabilities in this comprehensive conference talk. Delve into the building blocks of AD FS, including claims pipelines, security tokens, and assertions. Learn about identity providers, adapters, and techniques for locating AD FS proxies. Discover methods to target weak links and adapt attack strategies. Gain insights into the Windows Internal Database (WID) and techniques for locating and decrypting sensitive information. Examine tools like ADFSDump and ADFSpoof, and understand their implications. Conclude with best practices for mitigation and appropriate incident response strategies to enhance AD FS security.

I Am AD FS and So Can You - Attacking Active Directory Federated Services

WEareTROOPERS
Add to list
0:00 / 0:00