Do you follow documented system hardening processes
16
Answer yes to everything in this list
17
Step 1 Gathering Open Source Intelligence
18
Have an Open Honest Conversation
19
Looking Ahead
20
The Tool
21
Conclusion
Description:
Learn how to protect against domain admin theft and enhance cybersecurity measures in this 47-minute conference talk from GrrCON 2017. Explore the 8-step process of password spraying, remote admin tools, and hash attacks. Gain insights into defense-in-depth strategies, social engineering tactics, and the importance of identity management tools. Discover practical approaches for small businesses and understand the significance of documented system hardening processes. Delve into open-source intelligence gathering techniques and engage in an open, honest conversation about cybersecurity challenges. Acquire valuable knowledge to strengthen your organization's security posture and mitigate potential threats.
Stealing Domain Admin or How I Learned to Stop Worrying and Love the CSSF