Главная
Study mode:
on
1
Intro
2
Today's Talk
3
The Plan
4
NTLM Basics
5
NTLM Injection Vs NTLM Relay
6
NTLM Injection Example - GPO Update
7
New Attack Case - Azure AD Connect
8
NTLM Injection Against AD Connect
9
Microsoft Response
10
KDC Spoofing Protection
11
What we need for the attack
12
VMWare Center
13
Attack Scenario
14
Kerberos Injection - How to Mitigate?
15
Responsible Disclosure
16
Closing Remarks
17
Tips for Defenders
Description:
Explore a new class of Active Directory protocol injection attacks in this Black Hat conference talk. Delve into the security vulnerabilities of cryptographic systems, focusing on resilience against eavesdroppers and machine-in-the-middle (MiTM) attacks. Examine previous MiTM attacks on Active Directory authentication protocols and their mitigation strategies. Discover how relay attack techniques can be applied to the Kerberos authentication protocol. Learn about NTLM basics, NTLM injection versus NTLM relay, and see an NTLM injection example using GPO updates. Investigate a new attack case involving Azure AD Connect and the corresponding Microsoft response. Understand KDC spoofing protection and the requirements for executing these attacks. Analyze a VMWare Center attack scenario and explore Kerberos injection mitigation strategies. Gain valuable tips for defenders and insights into responsible disclosure practices.

Is This My Domain Controller? A New Class of Active Directory Protocol Injection Attacks

Black Hat
Add to list