Active Directory is leveraged by 90% of the enterprises and it is the key to secure the enterprise. So basically active directory is a central authentication and access control point. By abusing user attributes active directory can be converted into an exotic command and control. A quick demo on abusing user attributes and converting active directory into command and control. We will also look into the detection part.
Starts at Saturday March 10 2018, 12:25 PM. The sessions runs for about 1 hour.