So I Became a Domain Controller
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a conference talk from Black Hat that delves into the exploitation of Active Directory replication protocols. Learn how SAMBA's implementation of these protocols, while long-standing, was challenging to abuse, particularly on Windows operating systems. Discover the breakthrough achieved by the lsadump::DCSync feature in mimikatz, which enabled red teamers to extract crucial secrets for Kerberos token abuse and even impersonate domain controllers. Gain insights into how this technique provides read access to the AD database, potentially compromising network security. Presented by Benjamin Delpy and Vincent Le Toux, this 42-minute session offers valuable knowledge for cybersecurity professionals and enthusiasts interested in understanding and defending against advanced Active Directory attacks.
Syllabus
So I became a Domain Controller
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network