Главная
Study mode:
on
1
Introduction
2
What is Deception
3
How attackers use Deception
4
Kill Chain Diagram
5
decoy properties
6
Forging Trusts
7
Enumeration Phase
8
Advanced Audit Policy
9
Audit Rights
10
Deploy Deception
11
Create Deception User
12
Decrease Verbosity
13
Elder Tools
14
Demo
15
Computer Objects
16
Properties
17
Groups
18
Logs
19
Enumeration
20
Organizational Units
21
Master Slave Users
22
Assigning decoy users
23
Trust forests
24
Identifying Deception
25
How to Avoid Deception
26
What to Expect
27
Conclusion
28
Questions
Description:
Explore advanced Active Directory deception techniques in this BruCON Security Conference talk. Learn how to forge and implant computers, domain, and forest objects to target attacker methodologies and enhance network defense. Discover open-source scripts for deploying these techniques, and witness live demonstrations showcasing their effectiveness across the enterprise attack cycle. Gain insights into creating deceptive user accounts, manipulating audit policies, and implementing decoy properties to trap adversaries during enumeration and lateral movement phases. Understand how to identify and avoid deception while anticipating potential outcomes in this comprehensive exploration of trust forging for Active Directory security.

Forging Trusts for Deception in Active Directory

BruCON Security Conference
Add to list
0:00 / 0:00