Главная
Study mode:
on
1
Intro
2
How do we get ahead
3
Data breach announcements
4
Defense in depth
5
Social engineering
6
The 8step process
7
Password spraying
8
Remote admin tools
9
Impact
10
Identity Management Tools
11
Hash Attack
12
Small Business Perspective
13
The Tech Even Thinks
14
Oversimplifying the Process
15
Do you follow documented system hardening processes
16
Answer yes to everything in this list
17
Step 1 Gathering Open Source Intelligence
18
Have an Open Honest Conversation
19
Looking Ahead
20
The Tool
21
Conclusion
Description:
Learn how to protect against domain admin theft and enhance cybersecurity measures in this 47-minute conference talk from GrrCON 2017. Explore the 8-step process of password spraying, remote admin tools, and hash attacks. Gain insights into defense-in-depth strategies, social engineering tactics, and the importance of identity management tools. Discover practical approaches for small businesses and understand the significance of documented system hardening processes. Delve into open-source intelligence gathering techniques and engage in an open, honest conversation about cybersecurity challenges. Acquire valuable knowledge to strengthen your organization's security posture and mitigate potential threats.

Stealing Domain Admin or How I Learned to Stop Worrying and Love the CSSF

Add to list