
We will cover, in depth, different methods used by attackers to maintain persistence, covertly elevate privileges at will, and maintain and exert control over systems managed by Active Directory. We will talk about different methods of hunting and detecting for misconfigurations and backdoors to help find these faster and respond effectively.
Some of the hunt use cases that may be discussed include:
Hybrid Active Directory Backdoors
DACL Based Backdoors
Delegation Misuse
GPO based Backdoors
SID History Abuse
Misconfigurations of Authentication Methods
Persistent access using Machine Account password
Thirumalai Natarajan Muthiah, Principal Consultant, Mandiant -
Anurag Khanna, Manager - Incident Response & Consulting Services, Crowdstrike Services -
View upcoming Summits:
Download the presentation slides (SANS account required) at
#ThreatHuntingSummit #ActiveDirectory