ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind

Автор: Microsoft Israel R&D Center

Загружено: 2018-02-01

Просмотров: 9275

Описание: Active Directory: What Can Make Your Million Dollar SIEM Go Blind?

Active Directory is a key element for security and is a primary target in most of the common attacks today. There are also many tools used to ensure its protection. In large companies where there have been millions of dollars of investment in security, it appears that the logical choice to provide security monitoring of Active Directory is by using the company SIEM tool. Even if the chances of detecting a golden ticket are low, the logs processed by the SIEM can help track any object changes and can raise an alert in case of a suspicious modification to a privileged account.
With Benjamin Delpy the mimikatz author in a guest appearance, this talk focuses on two topics:
How an attacker can have more insight into your domains than you and how the attacker can also exploit distant domains, while being undetected by your SIEM
How the new mimikatz attack "DCShadow", by transforming a compromised workstation into a DC, can push changes that are unseen by your SIEM.

While post incident response handlers can use replication metadata to build the attack history, the DCShadow attack will demonstrate that this replication metadata can no longer be trusted and how the technical specification of the AD (MS-ADTS) can be bypassed in most cases. An example is, instead of gathering the krbtgt hash via DCSync, you can push your own secret.

Speaker Bio:
Vincent LE TOUX, 37 years old, French Security Manager in a large company SOC / CSIRT / SECOPS manager / AD expert CEO of My Smart Logon - smart card logon (www.mysmartlogon.com) Author of Ping Castle - an AD security tool (www.pingcastle.com) Contributions in Mimikatz Many open source contributions (OpenPGP, OpenSC, GIDS applet, ...) Presenter in many conferences including FIRST (Puerto Rico, 2017) & in France.

Guest Speaker:
Benjamin Delpy, is a Security Researcher known as `gentilkiwi`. A Security enthusiast, he publishes tools and articles that speak about products’ weaknesses and prove some of his ideas. Mimikatz was the first software he developed that reached an international audience. It is now recognized as a Windows security audit tool. He previously spoke at PHDays, ASFWS, StHack, BlackHat, BlueHat US and many more.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
BlueHat IL 2018 - Vincent Le Toux & Benjamin Delpy - What Can Make Your Million Dollar SIEM Go Blind

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEEP 2018: Benjamin Delpy

DEEP 2018: Benjamin Delpy

BlueHat IL 2025 - Benjamin Delpy `gentilkiwi` - Keynote - Mimi what?...

BlueHat IL 2025 - Benjamin Delpy `gentilkiwi` - Keynote - Mimi what?...

BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to .NET

BlueHat IL 2020 - The Wover &Ruben Boonen - Staying # & Bringing Covert Injection Tradecraft to .NET

TROOPERS19 - AD Security

TROOPERS19 - AD Security

How it began: The Story Behind Mimikatz - Paula Januszkiewicz talks with Benjamin Delpy

How it began: The Story Behind Mimikatz - Paula Januszkiewicz talks with Benjamin Delpy

Окупай DPI: Выводим провайдера на чистую воду

Окупай DPI: Выводим провайдера на чистую воду

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

OSINT для новичков: найдите всё о юзернейме и фото с Sherlock и Google Dorks!

BlueHat IL 2025 - Christopher Glyer - Keynote - Spy vs. Spy: Ransomware Edition

BlueHat IL 2025 - Christopher Glyer - Keynote - Spy vs. Spy: Ransomware Edition

Хакер демонстрирует самые безумные гаджеты в своем EDC

Хакер демонстрирует самые безумные гаджеты в своем EDC

Что на самом деле началось в Мексике? (НЕ КАРТЕЛИ!)

Что на самом деле началось в Мексике? (НЕ КАРТЕЛИ!)

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

ROSJA - 194 NARODY I WOJNA NA UKRAINIE. JAK PUTIN EKSPLOATUJE PROWINCJĘ

ROSJA - 194 NARODY I WOJNA NA UKRAINIE. JAK PUTIN EKSPLOATUJE PROWINCJĘ

DEF CON 24 - Beyond the MCSE: Red Teaming Active Directory

DEF CON 24 - Beyond the MCSE: Red Teaming Active Directory

Поиск угроз через Sysmon — саммит SANS Blue Team

Поиск угроз через Sysmon — саммит SANS Blue Team

BlueHat IL 2025 - Ori David - Now You See Me, Now You Don’t - Abusing VBS Enclaves to Create...

BlueHat IL 2025 - Ori David - Now You See Me, Now You Don’t - Abusing VBS Enclaves to Create...

Проблема нержавеющей стали

Проблема нержавеющей стали

Чиню DevOps инциденты | SadServers: bash, postgres, RBAC, k8s

Чиню DevOps инциденты | SadServers: bash, postgres, RBAC, k8s

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines

Beyond the Mcse: Active Directory for the Security Professional

Beyond the Mcse: Active Directory for the Security Professional

полный гайд на взлом всех роутеров

полный гайд на взлом всех роутеров

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]