Straw

Abstract

Active Directory is leveraged by 90% of the enterprises and it is the key to secure the enterprise. So basically active directory is a central authentication and access control point. By abusing user attributes active directory can be converted into an exotic command and control. A quick demo on abusing user attributes and converting active directory into command and control. We will also look into the detection part.

Speaker

Ankit Joshi

Timing

Starts at Saturday March 10 2018, 12:25 PM. The sessions runs for about 1 hour.

Resources