YoVDO

Exploiting Windows Group Policy for Reconnaissance and Attack

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Reconnaissance Courses

Course Description

Overview

Explore the vulnerabilities and attack vectors associated with Windows Group Policy in this comprehensive BSidesLV conference talk. Delve into the structure of Group Policy, including the GPC and GPT components, and understand how targeting mechanisms work. Discover the potential for reconnaissance and various attack paths, such as GPO settings manipulation, external path exploitation, GPT redirection, administrative template abuse, and Starter GPO misuse. Learn about essential tools for reconnaissance and gain insights into effective Group Policy defense strategies. Enhance your knowledge of Windows security by understanding how to harden systems against these attack vectors.

Syllabus

Intro
About Me
What Is Windows Group Policy
Group Policy Structure Explored the GPC
Group Policy Structure Explored.- the GPT
Group Policy Targeting Explained
Why is Group Policy Useful for Reconnaissance?
Tools for Reconnaissance
Attack Path: GPO Settings
Attack Path: External Paths
Attack Path: GPT Redirection
Attack Path: Administrative Template Abuse
Attack Path: Starter GPO Abuse
Group Policy Defense
Hardening Against Attack


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network