Главная
Study mode:
on
1
Intro
2
Who are we
3
Overview
4
Why Care
5
Offensive Research
6
Prior Work
7
Active Directory Backdoors
8
Access Control Mask
9
ACE Types
10
Security Reference Monitor
11
Bloodhound
12
Control of User Object
13
Control of Domain Object
14
Control of GPO
15
Generic Rights
16
Bloodhound Analysis
17
Bloodhound Demo
18
Apple Ad
19
Objectives
20
Stealth Primitives
21
Hiding the Object
22
Case Study 1
23
Demo
24
Admin SD Holder
25
Bad Guy
26
Exchange Server
27
Exchange Trusted Subsystem
28
Execution
29
Sean Metcalf
Description:
Explore an in-depth conference talk on designing security descriptor-based backdoors in Active Directory environments. Delve into the intricacies of Access Control Entries (ACEs), security descriptors, and their potential for creating stealthy persistence mechanisms. Learn about offensive research techniques, prior work in Active Directory backdoors, and the inner workings of the Security Reference Monitor. Gain insights into controlling user objects, domain objects, and Group Policy Objects (GPOs) through BloodHound analysis. Discover stealth primitives for hiding malicious objects and examine real-world case studies. Understand the implications of AdminSDHolder, Exchange Server vulnerabilities, and the Exchange Trusted Subsystem in creating and maintaining backdoors. Presented by Will Schroeder and Andy Robbins at TROOPERS18, this talk provides valuable knowledge for both offensive and defensive security professionals working with Active Directory infrastructures.

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

WEareTROOPERS
Add to list