BloodHound - Sniffing out domain admins
Description
Active Directory (AD) is the central administrative point for access data, roles and rights. Along with the Windows infrastructure, other applications are integrated via single sign-on. Anyone with administrative access to AD can control access to applications and their data and issue Kerberos tickets [1], which allow access to information. An intruder (offense [2]) in the internal network will therefore attempt to gain privileged rights in AD. Meanwhile, the relevant IT department (defense [3]) will work hard to prevent precisely this from happening. Domain users already have extensive read rights in AD and are able to access plenty of information, including attributes of users and groups, access rights (ACL) and group policies. These standard rights make it harder to protect AD, because the intruder can already get hold of plenty of information in this way.
Notes
Files
BloodHound - Sniffing out domain admins.pdf
Files
(413.9 kB)
Name | Size | Download all |
---|---|---|
md5:26d46d292ab368f78c5154905b888658
|
413.9 kB | Preview Download |