Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

WEareTROOPERS via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore an in-depth conference talk on designing security descriptor-based backdoors in Active Directory environments. Delve into the intricacies of Access Control Entries (ACEs), security descriptors, and their potential for creating stealthy persistence mechanisms. Learn about offensive research techniques, prior work in Active Directory backdoors, and the inner workings of the Security Reference Monitor. Gain insights into controlling user objects, domain objects, and Group Policy Objects (GPOs) through BloodHound analysis. Discover stealth primitives for hiding malicious objects and examine real-world case studies. Understand the implications of AdminSDHolder, Exchange Server vulnerabilities, and the Exchange Trusted Subsystem in creating and maintaining backdoors. Presented by Will Schroeder and Andy Robbins at TROOPERS18, this talk provides valuable knowledge for both offensive and defensive security professionals working with Active Directory infrastructures.

Syllabus

Intro
Who are we
Overview
Why Care
Offensive Research
Prior Work
Active Directory Backdoors
Access Control Mask
ACE Types
Security Reference Monitor
Bloodhound
Control of User Object
Control of Domain Object
Control of GPO
Generic Rights
Bloodhound Analysis
Bloodhound Demo
Apple Ad
Objectives
Stealth Primitives
Hiding the Object
Case Study 1
Demo
Admin SD Holder
Bad Guy
Exchange Server
Exchange Trusted Subsystem
Execution
Sean Metcalf

Taught by

WEareTROOPERS

Reviews

Start your review of An ACE Up The Sleeve - Designing Security Descriptor Based Backdoors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.