Top Active Directory Attacks - Understand, then Prevent and Detect

Top Active Directory Attacks - Understand, then Prevent and Detect

RSA Conference via YouTube Direct link

Realistic Threat Model

17 of 38

17 of 38

Realistic Threat Model

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Top Active Directory Attacks - Understand, then Prevent and Detect

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Different ways of conceptualizing breaches
  4. 4 Lockheed Martin Cyberkill Train trademark
  5. 5 What every attacker or attack needs
  6. 6 Internal access
  7. 7 Why internal access
  8. 8 A 10000 employee company
  9. 9 Twitter breach
  10. 10 Finding the right data
  11. 11 X filtration
  12. 12 Ransomware
  13. 13 High Level Picture
  14. 14 Prevent vs Detect
  15. 15 Safes
  16. 16 Assume Breach
  17. 17 Realistic Threat Model
  18. 18 Password Spraying
  19. 19 Single Factor Authentication
  20. 20 Credential Stuffing
  21. 21 File Sharing
  22. 22 dns fallback abuse
  23. 23 Look printers
  24. 24 Kerberos roasting
  25. 25 What are kerberos
  26. 26 normal flow
  27. 27 analogies
  28. 28 authentication
  29. 29 ticket granting
  30. 30 service ticket
  31. 31 kerberos steam
  32. 32 preventive detective controls
  33. 33 password protection
  34. 34 printers
  35. 35 sensitive files
  36. 36 longterm action
  37. 37 fallback abuse
  38. 38 Jeff

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.