Главная
Study mode:
on
1
Introduction
2
About Nikhil
3
What is ATA
4
Threat Detection
5
User Hunting
6
Further Attacks
7
Overpass detection
8
Golden Ticket decryption
9
Timebased detection
10
bypasses
11
Silver Ticket
12
Kerberos Ticket
13
Attacking ATA
14
MongoDB
15
MongoDB Console
16
Visibility
17
ATA still helps
18
Defending ATA
19
Avoiding ATA
20
Limitations
21
Conclusion
Description:
Explore techniques for evading Microsoft Advanced Threat Analytics (ATA) in Active Directory environments during this 50-minute conference talk from BruCON 0x09. Delve into ATA's defense mechanisms, including its ability to detect various attacks like Pass-the-Hash, Pass-the-Ticket, and Golden Ticket. Learn about potential vulnerabilities in ATA's design and discover how red teamers and penetration testers can modify their attack chains to bypass detection. Examine topics such as threat detection, user hunting, Kerberos ticket attacks, and MongoDB exploitation. Gain insights into defending and avoiding ATA, as well as understanding its limitations. Enhance your knowledge of Active Directory security and penetration testing methodologies in this comprehensive presentation.

Evading Microsoft ATA for Active Directory Domination

BruCON Security Conference
Add to list
0:00 / 0:00