Offensive Active Directory (Will Schroeder)

preview_player
Показать описание
Active Directory has been covered from a system administration aspect for as long as it has existed. However, much less information exists on how adversaries abuse and backdoor AD, leaving many defenders blind to the attacks being executed in their own environment. This talk will cover Active Directory from an offensive perspective, illustrating ways that attackers move through Windows networks with ease. PowerView (the PowerShell domain enumeration tool) will be highlighted, including how to use it for local administrator enumeration, domain trust hopping, user hunting, ACL auditing, and more. Much of PowerView can be used from a defensive perspective as well, allowing defenders to enumerate and plug holes in their networks before attackers find them.
Рекомендации по теме