An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

WEareTROOPERS via YouTube Direct link

Active Directory Backdoors

7 of 29

7 of 29

Active Directory Backdoors

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who are we
  3. 3 Overview
  4. 4 Why Care
  5. 5 Offensive Research
  6. 6 Prior Work
  7. 7 Active Directory Backdoors
  8. 8 Access Control Mask
  9. 9 ACE Types
  10. 10 Security Reference Monitor
  11. 11 Bloodhound
  12. 12 Control of User Object
  13. 13 Control of Domain Object
  14. 14 Control of GPO
  15. 15 Generic Rights
  16. 16 Bloodhound Analysis
  17. 17 Bloodhound Demo
  18. 18 Apple Ad
  19. 19 Objectives
  20. 20 Stealth Primitives
  21. 21 Hiding the Object
  22. 22 Case Study 1
  23. 23 Demo
  24. 24 Admin SD Holder
  25. 25 Bad Guy
  26. 26 Exchange Server
  27. 27 Exchange Trusted Subsystem
  28. 28 Execution
  29. 29 Sean Metcalf

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.