Deploying PAWs as Part of a Strategy to Limit Credential Theft and Lateral Movement
Offered By: YouTube
Course Description
Overview
Syllabus
Intro
WHEN NOT COMPUTERING...
ATTACK SCENARIO #2
WINDOWS LOGON TYPES
LOCAL SAM DATABASE
ACTIVE DIRECTORY DATABASE
LSA SECRETS
CREDENTIAL MANAGER
WINDOWS CREDENTIAL & AUTH ISSUES
STEALING WINDOWS ACCESS TOKENS
WINDOWS CRED & AUTH ISSUES
INTRODUCING PAWS
ACTIVE DIRECTORY ADMINISTRATIVE TIER MODEL
LOGON RESTRICTIONS
TRADITIONAL SOLUTIONS - JUMP SERVERS
PAW PREREQUISITES
PHASES OF DEPLOYMENT
PAW DEPLOYMENT MODELS
DEPLOY PAW ACTIVE DIRECTORY FRAMEWORK
PAW COMPUTER ACCOUNT GPOs
PAW USER GPOS
PAW GPOS - DENY LOWER TIER LOGON
RESTRICTED ADMIN)
PAW SETUP - PHASE 2
MULTI-FACTOR)
PAW SETUP - PHASE 3 (PROTECTED USERS)
LESSONS LEARNED FROM MY DEPLOYMENT
PAW DEPLOYMENT PAIRS WILL WITH NETWORK SEGMENTATION
NETWORK SEGMENTATION (LAYER3)
FURTHER LIMITING EXPOSURE TO CREDENTIAL THEFT AND LATERAL MOVEMENT
CLOSING
QUESTIONS/CONTACT
Related Courses
Advanced Ethical HackingCity College of San Francisco via California Community Colleges System Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System Check Point Jump Start: Harmony Endpoint Security
Checkpoint via Coursera Introduction to Personal Digital Security
Codecademy The Complete Pentesting and Privilege Escalation Course
Packt via Coursera