How to Efficiently Protect AD from Credential Theft & Compromise

How to Efficiently Protect AD from Credential Theft & Compromise

WEareTROOPERS via YouTube Direct link

Prerequisites

15 of 28

15 of 28

Prerequisites

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Efficiently Protect AD from Credential Theft & Compromise

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Windows Authentication
  3. 3 Key Types
  4. 4 Pack
  5. 5 Kerberos Authentication
  6. 6 Trust Anchor
  7. 7 Pass the Hash
  8. 8 Pass the Ticket
  9. 9 Pass the Service Ticket
  10. 10 Export the Service Ticket
  11. 11 From the attackers perspective
  12. 12 Selfmade kerberos
  13. 13 Golden Ticket
  14. 14 Change Password
  15. 15 Prerequisites
  16. 16 Capabilities
  17. 17 Demo
  18. 18 Mitigations
  19. 19 The Good News
  20. 20 HighLevel Steps
  21. 21 Administrative Model
  22. 22 Technical Configurations
  23. 23 Local Accounts
  24. 24 Benefits
  25. 25 Admin Tier Model
  26. 26 Mitigation
  27. 27 Mitigation Evaluation
  28. 28 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.