Главная
Study mode:
on
1
Introduction
2
What is Delegation
3
PowerShell Configuration
4
Detecting
5
RBCD
6
How to use RBCD
7
Detecting RBCD
8
BS Replication
9
Configuration
10
Detect
11
Persistence
12
Machine Account
13
Registry
14
Detection
Description:
Explore advanced threat hunting techniques in Active Directory environments through this 37-minute Black Hat conference talk. Delve into Mandiant's investigations of attacker privilege escalation, lateral movement, and persistence methods. Learn about backdoors and misconfigurations exploited for long-term privileged access. Examine the challenges in recognizing and remediating these techniques, influenced by control adoption and attacker sophistication in APJ. Gain in-depth knowledge of methods used by attackers to maintain persistence, covertly elevate privileges, and control Active Directory-managed systems. Cover topics including delegation, PowerShell configuration, detecting RBCD, BS replication, and machine account registry persistence. Presented by Anurag Khanna and Thirumalai Natarajan Muthiah, this talk provides valuable insights for cybersecurity professionals seeking to enhance their threat hunting capabilities in Active Directory environments.

Threat Hunting in Active Directory Environment

Black Hat
Add to list
0:00 / 0:00