Главная
Study mode:
on
1
Introduction
2
Outline
3
What is Group Policy
4
How does it work
5
Configuration settings
6
Prepatch scenario
7
How can it be attacked
8
Threat scenarios
9
Domain controllers
10
Domain members
11
SP signing
12
SP signing scenarios
13
SP signing diagram
14
Does it work
15
How to get a shell
16
Summary
17
Exploit process
18
Demo
19
Windows Domain Member
20
Linux Server
21
System Shells
22
Group Policy
23
Weak Passwords
24
User Settings
25
Local Configuration
26
Update User Settings
27
Win logon session
28
MS15011 and MS15014
29
How effective are these controls
30
User settings exploit
31
Is kerberos viable
32
kerberos example
33
decryption
34
domain controller
35
hardened uncpass
36
kerberos
37
log in
38
read response
39
caveats
40
Mitigation
41
User Policy
Description:
Learn how to exploit vulnerabilities in Windows Group Policy to gain control over entire networks in this 49-minute conference talk from SyScan'15 Singapore. Explore the inner workings of Group Policy, configuration settings, and potential attack vectors. Examine threat scenarios involving domain controllers, domain members, and service principal signing. Follow along with a live demonstration of exploiting weak passwords, user settings, and Kerberos to compromise systems. Discover the effectiveness of security controls like MS15-011 and MS15-014. Gain insights into the exploit process, system shells, and mitigation strategies for protecting against Group Policy hijacking attacks.

How to Own Any Windows Network via Group Policy Hijacking Attacks

SyScan360
Add to list