Evading Microsoft ATA for Active Directory Domination

Evading Microsoft ATA for Active Directory Domination

Black Hat via YouTube Direct link

Change Alert Identity

30 of 37

30 of 37

Change Alert Identity

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Evading Microsoft ATA for Active Directory Domination

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 About Me
  3. 3 Agenda
  4. 4 What is ATA
  5. 5 How it works
  6. 6 Lab Configuration
  7. 7 Threat Detection
  8. 8 User Hunting
  9. 9 SP and Scanning
  10. 10 Evading ATA with Power View
  11. 11 Brute Force
  12. 12 EType
  13. 13 AES Keys
  14. 14 Over Pasta Hash Detection
  15. 15 Fake Events
  16. 16 Golden Ticket Attack
  17. 17 Golden Ticket Downgrade
  18. 18 Lifetime Based Detection
  19. 19 Constrainted Delegation
  20. 20 Not Detected
  21. 21 No Use
  22. 22 No Detection
  23. 23 Kerberos
  24. 24 Sequel Servers
  25. 25 Interactions
  26. 26 Espeon Scanning
  27. 27 LDAP IPSec ESB
  28. 28 Attacking Microsoft ATA
  29. 29 MongoDB
  30. 30 Change Alert Identity
  31. 31 Set Alert Visibility
  32. 32 Defenses
  33. 33 Avoiding ATA
  34. 34 Limitations
  35. 35 ATA Team
  36. 36 Summary
  37. 37 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.