Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Why Care?
4
Previous Work
5
DS_CONTROL_ACCESS
6
SRM and Canonical ACE Order
7
Elevation vs. Persistence
8
Target: User Objects
9
Target: Group Objects
10
Target: Computer Objects
11
Target: Domain Objects
12
AD Generic Rights
13
AD Control Rights
14
BloodHound Analysis
15
Objective
16
Stealth Primitive
17
Primitives: Summary
18
A Hidden DCSync Backdoor
19
Admin SDHolder
20
Domain user can access AdmPwd! LAPS cmdlet doesn't detect it!
21
Exchange Strikes Back
22
Event Logs
23
Replication Metadata
24
Future Work
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the untapped offensive landscape of Active Directory (AD) object discretionary access control lists (DACLs) in this Black Hat conference talk. Delve into how control relationships between AD objects align with the "attackers think in graphs" philosophy, exposing a new class of control edges that expand paths to domain compromise. Learn about elevation vs. persistence techniques, targeting various AD objects, and understanding AD generic and control rights. Discover stealthy primitives, hidden DCSync backdoors, and the implications for tools like LAPS. Examine the impact on event logs, replication metadata, and potential future developments in this critical area of cybersecurity.

An ACE Up the Sleeve - Designing Active Directory DACL Backdoors

Black Hat
Add to list