It’s tough to stay on top of who has effective permissions to critical objects in Active Directory given the many ways that access can be granted. However, it is mission-critical in today’s security landscape. Why? Because cyber attackers are constantly finding innovative ways to steal your credentials and data. The latest exploit is using a new Bloodhound version that leverages Active Directory permissions as part of its attack path mapping.
In this on-demand webinar, Cybersecurity veterans and STEALTHbits senior executives Jeff Warren and Jonathan Sander will walk you through the 4 stages of an attacker’s path:
- Exploiting Weak Permissions with PowerSploit
- Attacking AD Permissions with Bloodhound
- Persistence using AdminSDHolder and SDProp
- Unconstrained Delegation Permissions
View the Webinar!