Главная
Study mode:
on
1
Intro
2
Pen Testing is BROKEN
3
I WANT A RED TEAM
4
ASSUMED WHAT?
5
Compromised USER
6
AV/EDR - DISABLED?
7
MALICIOUS USER
8
REAL WORLD TACTICS
9
ASSUMED BREACH TACTICS
10
DOMAIN FRONTING
11
INITIAL ACCESS
12
FINDING ACCOUNTS
13
KERBEROASTING
14
MINING AD
15
HUNTING GPP CREDS
16
LATERAL MOVEMENT
17
TRAWLING FILES/SHARES
18
HUNTING SESSIONS
19
BYO POWERSHELL
20
PROS & CONS
21
SUMMARY
22
QUESTIONS?
Description:
Explore an innovative approach to penetration testing in this conference talk from Derbycon 2019. Delve into the concept of "Assumed Breach" as Mike Saunders challenges traditional pen testing methods and advocates for a more realistic model. Learn about real-world tactics, including domain fronting, initial access techniques, and lateral movement strategies. Discover methods for finding accounts, Kerberoasting, mining Active Directory, and hunting for GPP credentials. Gain insights on trawling files and shares, hunting sessions, and leveraging PowerShell in penetration testing scenarios. Examine the pros and cons of this approach and understand how it can provide a more accurate assessment of an organization's security posture.

Assumed Breach - A Better Model for Penetration Testing

Add to list
0:00 / 0:00