YoVDO

Threat Hunting in Active Directory Environment

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses PowerShell Courses Active Directory Courses Threat Hunting Courses

Course Description

Overview

Explore advanced threat hunting techniques in Active Directory environments through this 37-minute Black Hat conference talk. Delve into Mandiant's investigations of attacker privilege escalation, lateral movement, and persistence methods. Learn about backdoors and misconfigurations exploited for long-term privileged access. Examine the challenges in recognizing and remediating these techniques, influenced by control adoption and attacker sophistication in APJ. Gain in-depth knowledge of methods used by attackers to maintain persistence, covertly elevate privileges, and control Active Directory-managed systems. Cover topics including delegation, PowerShell configuration, detecting RBCD, BS replication, and machine account registry persistence. Presented by Anurag Khanna and Thirumalai Natarajan Muthiah, this talk provides valuable insights for cybersecurity professionals seeking to enhance their threat hunting capabilities in Active Directory environments.

Syllabus

Introduction
What is Delegation
PowerShell Configuration
Detecting
RBCD
How to use RBCD
Detecting RBCD
BS Replication
Configuration
Detect
Persistence
Machine Account
Registry
Detection


Taught by

Black Hat

Related Courses

Office 365: Managing Identities and Services
Microsoft via edX
Microsoft Exchange Server 2016 - 1: Infrastructure
Microsoft via edX
Skype for Business: Voice Concepts and Planning
Microsoft via edX
Skype for Business: Voice Hybrid and Routing
Microsoft via edX
Manage Office 365 Identities
Microsoft via edX