Главная
Study mode:
on
1
Introduction
2
Agenda
3
Different ways of conceptualizing breaches
4
Lockheed Martin Cyberkill Train trademark
5
What every attacker or attack needs
6
Internal access
7
Why internal access
8
A 10000 employee company
9
Twitter breach
10
Finding the right data
11
X filtration
12
Ransomware
13
High Level Picture
14
Prevent vs Detect
15
Safes
16
Assume Breach
17
Realistic Threat Model
18
Password Spraying
19
Single Factor Authentication
20
Credential Stuffing
21
File Sharing
22
dns fallback abuse
23
Look printers
24
Kerberos roasting
25
What are kerberos
26
normal flow
27
analogies
28
authentication
29
ticket granting
30
service ticket
31
kerberos steam
32
preventive detective controls
33
password protection
34
printers
35
sensitive files
36
longterm action
37
fallback abuse
38
Jeff
Description:
Explore the most prevalent and potent Active Directory attacks in this 40-minute RSA Conference talk by Jeff McJunkin, Founder of Rogue Valley Information Security. Gain crucial insights into how hackers exploit enterprise vulnerabilities, and learn effective strategies to prevent and detect these threats. Delve into topics such as the Lockheed Martin Cyberkill Chain, internal access risks, password spraying, credential stuffing, DNS fallback abuse, and Kerberos roasting. Discover practical preventive and detective controls, including password protection measures, printer security, and sensitive file management. Equip yourself with the knowledge to strengthen your organization's Active Directory defenses and stay one step ahead of attackers.

Top Active Directory Attacks - Understand, then Prevent and Detect

RSA Conference
Add to list
0:00 / 0:00