Windows Credentials Attacks, Mitigations & Defense

Поділитися
Вставка
  • Опубліковано 26 лип 2024
  • The topic discussed in this webcast is just one of the many subjects covered in FOR508 Advanced Digital Forensics, Incident Response & Threat Hunting course. To learn more about the course or to find training visit the course page: www.sans.org/FOR508
    For webcast slides, sign in to your sans portal account.
    Description:
    Windows credentials are arguably the largest vulnerability affecting the modern enterprise. Credential harvesting is goal number one post-exploitation, and hence it provides an appealing funnel point for identifying attacks early in the kill chain. Unfortunately, credentials are diverse and numerous in Windows, and so are the attacks. With significant credential theft mitigations released in Win8.1, Win10 and Server 2012/2016, both red and blue teams require an enhanced understanding of Windows credentials. Red teamers may suddenly find their favorite techniques obsolete, while the blue team needs to take advantage of available mitigation techniques as soon as possible. Credential types, attack tools, and mitigation will all be discussed, giving insight into both sides of the equation.
    Speaker Bio
    Chad Tilbury
    Chad has nearly 20 years of experience working with government agencies, defense contractors, and Fortune 500 companies. And his case list looks like it's been pulled straight from those spy novels he grew up reading: murder, abduction, espionage, fraud, hacking, intellectual property theft, child exploitation, terrorism, and computer intrusions. He has served as a Special Agent with the Air Force Office of Special Investigations, where he investigated and conducted computer forensics for a variety of crimes and ushered counter-espionage techniques into the digital age. Chad has also led international forensic teams and was selected to provide computer forensic support to the United Nations Weapons Inspection Team. He is a technical director at CrowdStrike, where he specializes in incident response, corporate espionage, and computer forensics. Here at SANS, Chad is a senior instructor and co-author for two six-day courses: FOR500: Windows Forensic Analysis, which focuses on the core skills required to become a certified forensic practitioner, and FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting, which teaches sophisticated computer intrusion analysis and advanced threat hunting techniques.
  • Наука та технологія

КОМЕНТАРІ • 3

  • @IceDruid23
    @IceDruid23 9 місяців тому

    Very nice presentation, thank you!

  • @khalfanalmazrouei9193
    @khalfanalmazrouei9193 6 років тому

    Thanx for good video

  • @nicksewell6642
    @nicksewell6642 3 роки тому

    So could we use Bloodhound, to perhaps scan for bad practices around the network?