Active Directory security workshops

Active Directory security workshops

Active Directory security workshops

Pentesters or attackers often exploit the same obvious vulnerabilities in Active directory. Come learn how to exploit and mitigate them.

Active Directory security workshops

Abstract

(Spoiler alert) During a cyber-attack, the Active Directory is one of the favourite targets in every firm. Very, very (very) often, to not say always, the active directory is compromised … Sadly, pentesters or attackers often exploit the same obvious vulnerabilities to bounce and perform a privilege escalation. Come learn how to exploit and mitigate them. With something a little different, we are convinced that most common attacks against Active Directory could be prevented.

Storyline

Welcome to the PacMan Firm, the most insecure network ever, we have a very large Active Directory environment and we do no security at all. For now, no ghost has ever hacked our corporate network (at least we hope) but our new CISO requires us to perform a security assessment.

Your mission, should you choose to accept it, is to evaluate our security level and fix the issues.

Detailed content

In this fully hands-on workshop, we’ll guide you through 8 of the lowest hanging fruit weaknesses that we witnessed during numerous penetration tests. You’ll learn how to:

  • Spot passwords inside user descriptions
  • Find passwords on shared folders
  • Spray passwords over accounts
  • Quickly detect obsolete workstations and servers
  • Get free password hashes by kerberoasting
  • Pivot from machine to machine by reusing local credentials
  • Spot machines where Domain Admins are connected
  • Retrieve Domain Admins credentials in memory
  • Do it faster, do it stronger

Crackmapexec, Powerview, Rubeus, Mimikatz, BloodHound will be your best friends during this workshop.

Video

Video of each fruit could be found inside the Video directory.

Download

Copyright (c) 2019 Wavestone – Cybersecurity & Digital Trust