YoVDO

How to Own Any Windows Network via Group Policy Hijacking Attacks

Offered By: SyScan360 via YouTube

Tags

SyScan360 Courses Cybersecurity Courses Network Security Courses Group Policy Courses Password Security Courses Domain Controllers Courses

Course Description

Overview

Learn how to exploit vulnerabilities in Windows Group Policy to gain control over entire networks in this 49-minute conference talk from SyScan'15 Singapore. Explore the inner workings of Group Policy, configuration settings, and potential attack vectors. Examine threat scenarios involving domain controllers, domain members, and service principal signing. Follow along with a live demonstration of exploiting weak passwords, user settings, and Kerberos to compromise systems. Discover the effectiveness of security controls like MS15-011 and MS15-014. Gain insights into the exploit process, system shells, and mitigation strategies for protecting against Group Policy hijacking attacks.

Syllabus

Introduction
Outline
What is Group Policy
How does it work
Configuration settings
Prepatch scenario
How can it be attacked
Threat scenarios
Domain controllers
Domain members
SP signing
SP signing scenarios
SP signing diagram
Does it work
How to get a shell
Summary
Exploit process
Demo
Windows Domain Member
Linux Server
System Shells
Group Policy
Weak Passwords
User Settings
Local Configuration
Update User Settings
Win logon session
MS15011 and MS15014
How effective are these controls
User settings exploit
Is kerberos viable
kerberos example
decryption
domain controller
hardened uncpass
kerberos
log in
read response
caveats
Mitigation
User Policy


Taught by

SyScan360

Related Courses

Network Security
(ISC)² via Coursera
5G Network Fundamentals
Institut Mines-Télécom via Coursera
5G for Everyone
Qualcomm via Coursera
AWS Advanced Networking Specialty (LA)
A Cloud Guru
AWS Certified Advanced Networking - Specialty 2020
A Cloud Guru