Главная
Study mode:
on
1
Intro
2
BLOODHOUND
3
GOFETCH
4
ATTACKERS VS. DEFENDERS ATTACKERS
5
HOW CAN DEFENDERS USE GRAPHS?
6
DATA SOURCES
7
PREVENTION: VULNERABLE NODES
8
PREVENTION: DISCONNECTING NODES
9
DETECTION: LOGON GRAPH
10
DETECTION: WEIGHTED LOGON GRAPH
11
DETECTION: EXAMPLE
12
DETECTION: PROS & cons
13
INVESTIGATION
Description:
Explore a 26-minute Black Hat conference talk on leveraging graphs to enhance security in domain environments. Discover how defenders are shifting from list-based thinking to graph-based approaches to combat sophisticated attackers. Learn about tools like BloodHound and GoFetch, and examine prevention strategies involving vulnerable nodes and node disconnection. Delve into detection techniques using logon graphs and weighted logon graphs, complete with examples and a discussion of pros and cons. Gain insights into investigation methods and understand how graph-based thinking can revolutionize security practices in large-scale environments.

Breaking the Attack Graph - How to Leverage Graphs to Strengthen Security in a Domain Environment

Black Hat
Add to list
0:00 / 0:00