Attivo Networks News

Attackers want Active Directory privileges. Here’s how to stop them

Reading Time: < 1 minute  |  Published: November 2, 2020 in Attivo News

A growing number of threat actors use advanced persistent threat (APT) tactics to progress their attacks. More and more target Active Directory (AD), domain controllers, and flaws in Kerberos tickets to find weaknesses, steal credentials, and escalate privileges. By gathering this information, attackers can gain what they need to establish a foothold, move laterally through the network without detection, and secure administrator privileges.

More than 90 percent of businesses use AD as their identity management system, which serves as a master directory and the means to control access to enterprise services. Tools such as Bloodhound, Mimikatz, and Metasploit are useful for legitimate security research. However, they have also made it much easier for attackers to engage in credential-dumping, recovering plaintext or hashed passwords from systems, gaining Domain Admin privileges, and securing the “blueprint” of the network.

Learn how to protect Active Directory with deception and denial in the complete SC Magazine article by Carolyn Crandall.

No Comments

Post A Comment

five × 3 =