ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Beyond the Mcse: Active Directory for the Security Professional

Автор: Black Hat

Загружено: 2016-11-22

Просмотров: 18489

Описание: by Sean Metcalf

Active Directory (AD) is leveraged by 95% of the Fortune 1000 companies for its directory, authentication, and management capabilities. This means that both Red and Blue teams need to have a better understanding of Active Directory, it's security, how it's attacked, and how best to align defenses. This presentation covers key Active Directory components which are critical for security professionals to know in order to defend AD. Properly securing the enterprise means identifying and leveraging appropriate defensive technologies. The provided information is immediately useful and actionable in order to help organizations better secure their enterprise resources against attackers. Highlighted are areas attackers go after including some recently patched vulnerabilities and the exploited weaknesses. This includes the critical Kerberos vulnerability (MS14-068), Group Policy Man-in-the-Middle (MS15-011 & MS15-014) and how they take advantages of AD communication.

Some of the content covered:

Differing views of Active Directory: admin, attacker, and infosec.
The differences between forests and domains, including how multi-domain AD forests affect the security of the forest.
Dig into trust relationships and the available security features describing how attack techniques are impacted by implementing these trust security features.
AD database format, files, and object storage (including password data).
Read-Only Domain Controllers (RODCs), security impact, and potential issues with RODC implementation.
Key Domain Controller information and how attackers take advantage.
Windows authentication protocols over the years and their weaknesses, including Microsoft's next-generation credential system, Microsoft Passport, and what it means for credential protection.
Security posture differences between AD on-premises and in the cloud (Microsoft Azure AD vs Office 365).
Key Active Directory security features in the latest Windows OS versions - the benefits and implementation challenges.


Let's go beyond the standard MCSE material and dive into how Active Directory works focusing on the key components and how they relate to enterprise security.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Beyond the Mcse: Active Directory for the Security Professional

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Securing Active Directory: Resolving Common Issues

Securing Active Directory: Resolving Common Issues

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

DEF CON 24 - Beyond the MCSE: Red Teaming Active Directory

DEF CON 24 - Beyond the MCSE: Red Teaming Active Directory

Certified Pre-Owned: Abusing Active Directory Certificate Services

Certified Pre-Owned: Abusing Active Directory Certificate Services

TR19: From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It

TR19: From Workstation to Domain Admin: Why Secure Administration Isn't Secure and How to Fix It

Top Active Directory Attacks: Understand, then Prevent and Detect

Top Active Directory Attacks: Understand, then Prevent and Detect

Securing Active Directory: Performing Your Own AD Security Review

Securing Active Directory: Performing Your Own AD Security Review

An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

An ACE Up the Sleeve: Designing Active Directory DACL Backdoors

Abusing Microsoft Kerberos: Sorry You Guys Don't Get It

Abusing Microsoft Kerberos: Sorry You Guys Don't Get It

Взлом Bitlocker — обход шифрования диска Windows

Взлом Bitlocker — обход шифрования диска Windows

1 18 Active Directory Security Beyond the Easy Button Sean Metcalf

1 18 Active Directory Security Beyond the Easy Button Sean Metcalf

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Common Active Directory Attacks: Back to the Basics of Security Practices

Common Active Directory Attacks: Back to the Basics of Security Practices

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Offensive Active Directory with Powershell

Offensive Active Directory with Powershell

Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)

Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

BSidesCharm 2017 T208 Detecting the Elusive Active Directory Threat Hunting Sean Metcalf

Понимание Active Directory и групповой политики

Понимание Active Directory и групповой политики

Securing Active Directory: Protecting AD Administration

Securing Active Directory: Protecting AD Administration

Kerberos & Attacks 101

Kerberos & Attacks 101

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]