Hunting backdoors in Active Directory Environment

  Рет қаралды 4,222

SANS Digital Forensics and Incident Response

SANS Digital Forensics and Incident Response

Күн бұрын

We conducted multiple investigations and assessments, observed techniques that attackers preferred as they conducted privilege escalation to move laterally, persist in the Active Directory environment, and blend in. Backdoors and misconfigurations on Active directory systems provided attackers with long term privileged access to the environment.
We will cover, in depth, different methods used by attackers to maintain persistence, covertly elevate privileges at will, and maintain and exert control over systems managed by Active Directory. We will talk about different methods of hunting and detecting for misconfigurations and backdoors to help find these faster and respond effectively.
Some of the hunt use cases that may be discussed include:
Hybrid Active Directory Backdoors
DACL Based Backdoors
Delegation Misuse
GPO based Backdoors
SID History Abuse
Misconfigurations of Authentication Methods
Persistent access using Machine Account password
Thirumalai Natarajan Muthiah, Principal Consultant, Mandiant - / th1rum
Anurag Khanna, Manager - Incident Response & Consulting Services, Crowdstrike Services - / khannaanurag
View upcoming Summits: www.sans.org/u/DuS
Download the presentation slides (SANS account required) at www.sans.org/u...
#ThreatHuntingSummit #ActiveDirectory

Пікірлер: 5
Hunting Malicious Office Macros
21:19
SANS Digital Forensics and Incident Response
Рет қаралды 4,7 М.
Common misconceptions and mistakes made in Threat Hunting
31:22
SANS Digital Forensics and Incident Response
Рет қаралды 4,4 М.
The perfect snowball 😳❄️ (via @vidough/TT)
00:31
SportsNation
Рет қаралды 77 МЛН
Cute dog Won Squid Game 😱💸 #dog # funny #cartoon
00:33
Wooffey
Рет қаралды 21 МЛН
Beyond the Mcse: Active Directory for the Security Professional
49:53
TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines
59:06
TROOPERS IT Security Conference
Рет қаралды 28 М.
Keynote: Cobalt Strike Threat Hunting | Chad Tilbury
45:45
SANS Digital Forensics and Incident Response
Рет қаралды 32 М.
Stay ahead of the game: automate your threat hunting workflows
30:26
SANS Digital Forensics and Incident Response
Рет қаралды 4 М.
Hunting and Scoping A Ransomware Attack
30:14
SANS Digital Forensics and Incident Response
Рет қаралды 7 М.
Hunting for Active Directory Persistence
37:51
SANS Digital Forensics and Incident Response
Рет қаралды 3,1 М.
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
SANS EMEA
Рет қаралды 30 М.
What if all the world's biggest problems have the same solution?
24:52