Finding Our Path - How We're Trying to Improve Active Directory Security

Finding Our Path - How We're Trying to Improve Active Directory Security

Black Hat via YouTube Direct link

Introduction

1 of 43

1 of 43

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Finding Our Path - How We're Trying to Improve Active Directory Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Welcome
  3. 3 Background
  4. 4 Prior Work
  5. 5 What is Bloodhound
  6. 6 Problem Solving
  7. 7 Two APIs
  8. 8 NetSession enum
  9. 9 NetLocalGroup enum
  10. 10 Matt Nelson
  11. 11 The New Way
  12. 12 Running Sharp Out
  13. 13 Bloodhound
  14. 14 Kerberos
  15. 15 Why is delegation needed
  16. 16 Resourcebased constrained delegation
  17. 17 Why does this matter
  18. 18 What does that mean in English
  19. 19 Bloodhound interface
  20. 20 Verify ACLs
  21. 21 DC Sync
  22. 22 What are we trying to do
  23. 23 John Lambert quote
  24. 24 Methodology
  25. 25 Objective
  26. 26 Privileges
  27. 27 Kerberos Sting
  28. 28 LowHanging Fruit
  29. 29 What about this
  30. 30 Objectives
  31. 31 Shortest Paths
  32. 32 All Attack Paths
  33. 33 Its extremely complicated
  34. 34 The shortest path
  35. 35 Analyzing all paths
  36. 36 Analyzing domain admins
  37. 37 Analyzing GPOs
  38. 38 Abusable ACLs
  39. 39 Inbound Object Control
  40. 40 Real Numbers
  41. 41 Whats Possible
  42. 42 Free and Open Source
  43. 43 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.