40% Off Career-Building Certificates
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore an in-depth conference talk on designing security descriptor-based backdoors in Active Directory environments. Delve into the intricacies of Access Control Entries (ACEs), security descriptors, and their potential for creating stealthy persistence mechanisms. Learn about offensive research techniques, prior work in Active Directory backdoors, and the inner workings of the Security Reference Monitor. Gain insights into controlling user objects, domain objects, and Group Policy Objects (GPOs) through BloodHound analysis. Discover stealth primitives for hiding malicious objects and examine real-world case studies. Understand the implications of AdminSDHolder, Exchange Server vulnerabilities, and the Exchange Trusted Subsystem in creating and maintaining backdoors. Presented by Will Schroeder and Andy Robbins at TROOPERS18, this talk provides valuable knowledge for both offensive and defensive security professionals working with Active Directory infrastructures.
Syllabus
Intro
Who are we
Overview
Why Care
Offensive Research
Prior Work
Active Directory Backdoors
Access Control Mask
ACE Types
Security Reference Monitor
Bloodhound
Control of User Object
Control of Domain Object
Control of GPO
Generic Rights
Bloodhound Analysis
Bloodhound Demo
Apple Ad
Objectives
Stealth Primitives
Hiding the Object
Case Study 1
Demo
Admin SD Holder
Bad Guy
Exchange Server
Exchange Trusted Subsystem
Execution
Sean Metcalf
Taught by
WEareTROOPERS