Forging Trusts for Deception in Active Directory

Hacker
Oct. 6, 2018
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
1 of 36

More Related Content

What's hot

PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
Ready player 2  Multiplayer Red Teaming Against macOSReady player 2  Multiplayer Red Teaming Against macOS
Ready player 2 Multiplayer Red Teaming Against macOSCody Thomas
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundDirkjanMollema
Evading Microsoft ATA for Active Directory DominationEvading Microsoft ATA for Active Directory Domination
Evading Microsoft ATA for Active Directory DominationNikhil Mittal
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin

Similar to Forging Trusts for Deception in Active Directory

Webinar: Securing your data - Mitigating the risks with MongoDBWebinar: Securing your data - Mitigating the risks with MongoDB
Webinar: Securing your data - Mitigating the risks with MongoDBMongoDB
Case and User SecurityCase and User Security
Case and User SecurityIpro Tech
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...PROIDEA
201504 securing cassandraanddse201504 securing cassandraanddse
201504 securing cassandraanddseJohnny Miller
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...
Webinar: Compliance and Data Protection in the Big Data Age: MongoDB Security...MongoDB

Similar to Forging Trusts for Deception in Active Directory(20)

More from Nikhil Mittal

Workshop: PowerShell for Penetration TestersWorkshop: PowerShell for Penetration Testers
Workshop: PowerShell for Penetration TestersNikhil Mittal
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShellNikhil Mittal
Powerpreter: Post Exploitation like a BossPowerpreter: Post Exploitation like a Boss
Powerpreter: Post Exploitation like a BossNikhil Mittal
PowerShell for Penetration TestersPowerShell for Penetration Testers
PowerShell for Penetration TestersNikhil Mittal
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shellNikhil Mittal

Recently uploaded

Product Listing Presentation-Maidy Veloso.pptxProduct Listing Presentation-Maidy Veloso.pptx
Product Listing Presentation-Maidy Veloso.pptxMaidyVeloso
Cloud Study Jam ppt.pptxCloud Study Jam ppt.pptx
Cloud Study Jam ppt.pptxPoorabpatel
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionSolving today’s Traffic Problems with Sustainable Ride Hailing Solution
Solving today’s Traffic Problems with Sustainable Ride Hailing SolutionOn Demand Clone
"Software Architecture for Humans!", Eberhard Wolff "Software Architecture for Humans!", Eberhard Wolff
"Software Architecture for Humans!", Eberhard Wolff Fwdays
RemeOs science and clinical data 20230926_PViv2 (4).pptxRemeOs science and clinical data 20230926_PViv2 (4).pptx
RemeOs science and clinical data 20230926_PViv2 (4).pptxPetrusViitanen1
Deep Dive Microsoft Viva Insights - Collabdays Bletchley Park 2023Deep Dive Microsoft Viva Insights - Collabdays Bletchley Park 2023
Deep Dive Microsoft Viva Insights - Collabdays Bletchley Park 2023Chirag Patel

Recently uploaded(20)

Forging Trusts for Deception in Active Directory

Editor's Notes

  1. Image credit: http://www.inflatechdecoy.com
  2. * This is a misquote
  3. https://docs.microsoft.com/en-us/windows/desktop/api/winnt/ns-winnt-_system_audit_ace https://docs.microsoft.com/en-us/windows/desktop/secauthz/access-control-entries
  4. https://docs.microsoft.com/en-us/windows/desktop/SecAuthZ/access-mask
  5. See http://dcshadow.com/ for details about the DCShadow attack by Benjamin and Vincent
  6. Configuration|Windows Settings|Security Settings|Advanced Audit Policy Configuration|Audit Policies|Account Logon | Audit Kerberos Authentication Service -> Success and Failure
  7. https://i.dailymail.co.uk/i/pix/2011/07/20/article-2017058-0D12DD6500000578-789_634x454.jpg