Exploiting Windows Group Policy for Reconnaissance and Attack
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the vulnerabilities and attack vectors associated with Windows Group Policy in this comprehensive BSidesLV conference talk. Delve into the structure of Group Policy, including the GPC and GPT components, and understand how targeting mechanisms work. Discover the potential for reconnaissance and various attack paths, such as GPO settings manipulation, external path exploitation, GPT redirection, administrative template abuse, and Starter GPO misuse. Learn about essential tools for reconnaissance and gain insights into effective Group Policy defense strategies. Enhance your knowledge of Windows security by understanding how to harden systems against these attack vectors.
Syllabus
Intro
About Me
What Is Windows Group Policy
Group Policy Structure Explored the GPC
Group Policy Structure Explored.- the GPT
Group Policy Targeting Explained
Why is Group Policy Useful for Reconnaissance?
Tools for Reconnaissance
Attack Path: GPO Settings
Attack Path: External Paths
Attack Path: GPT Redirection
Attack Path: Administrative Template Abuse
Attack Path: Starter GPO Abuse
Group Policy Defense
Hardening Against Attack
Taught by
BSidesLV
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network