YoVDO

Finding Our Path - How We're Trying to Improve Active Directory Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Risk Mitigation Courses User Behavior Analysis Courses Kerberos Courses BloodHound Courses Active Directory Security Courses

Course Description

Overview

Explore a comprehensive Black Hat conference talk on enhancing Active Directory security. Discover success stories, lessons learned, and methodologies for identifying and mitigating risks associated with user behaviors and configurations. Learn how to significantly improve your organization's Active Directory security posture within weeks, regardless of network size. Gain insights into enumerating and understanding security risks, and walk away with practical strategies for implementation. Delve into topics such as BloodHound, Kerberos delegation, DC Sync, privilege analysis, and attack path identification. Understand the complexities of Active Directory security and acquire the knowledge to effectively analyze and secure your network infrastructure.

Syllabus

Introduction
Welcome
Background
Prior Work
What is Bloodhound
Problem Solving
Two APIs
NetSession enum
NetLocalGroup enum
Matt Nelson
The New Way
Running Sharp Out
Bloodhound
Kerberos
Why is delegation needed
Resourcebased constrained delegation
Why does this matter
What does that mean in English
Bloodhound interface
Verify ACLs
DC Sync
What are we trying to do
John Lambert quote
Methodology
Objective
Privileges
Kerberos Sting
LowHanging Fruit
What about this
Objectives
Shortest Paths
All Attack Paths
Its extremely complicated
The shortest path
Analyzing all paths
Analyzing domain admins
Analyzing GPOs
Abusable ACLs
Inbound Object Control
Real Numbers
Whats Possible
Free and Open Source
Questions


Taught by

Black Hat

Related Courses

Google Location Services on Android
Google via Udacity
Анализ данных: финальный проект
Moscow Institute of Physics and Technology via Coursera
Mobile Application Experiences Part 3: Building Mobile Apps
Massachusetts Institute of Technology via edX
Understanding User Needs
University of Michigan via edX
Firebase Analytics: Android
Google via Udacity