Explore advanced post-exploitation techniques for abusing Active Directory in this 41-minute conference talk by Carlos Perez at DerbyCon 4. Gain insights into leveraging compromised Active Directory environments, learn about common misconfigurations, and discover methods for escalating privileges and maintaining persistence within corporate networks. Delve into practical demonstrations and real-world scenarios to enhance your understanding of Active Directory security vulnerabilities and how attackers exploit them during post-exploitation phases.
Overview
Syllabus
t105 Abusing Active Directory in Post Exploitation Carlos Perez