Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

There's more than one way to get admin privileges

1,438 views

Published on

Learn and understand Active Directory from a cyber attackers perspective, and ways to safeguard your organization from attacks.

Published in: Software
  • Built-in system tools ( like PowerShell ) can be exploited by attackers to compromise on-premise and cloud deployments. Learn more from here: https://bit.ly/PSAzAD
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Most of the attacks mentioned above are targeted towards sensitive or privileged users. Attackers often analyze the domain or perform reconnaissance to discover vulnerabilities or privileged users to target their attacks better. If we can detect reconnaissance attempts in our environment, this could be a good starting point to detect potential attack attempts. Learn more from here- https://zurl.co/eaxc
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

×