Getting Inside the Mind of an Attacker: After the Breach - Next Steps After Compromising Active Directory
Unfortunately, the reality of cybersecurity is that attackers will sometimes succeed in breaching an IT environment. Accepting this probability allows you to focus on learning how to detect a breach and manage such attacks.
Cybersecurity expert Julio Sanchez demonstrates approaches threat actors may take in an attempt to gain persistence after compromising Active Directory. Learn how each technique leaves different signs of compromise and how open-source tools can be used to spot them.
Would you rather read a step-by-step guide of the process? Check out the Getting Inside the Mind of an Attacker series here:
- Part 1 - Achieving Persistence with Golden and Silver Tickets
- Part 2 - Achieving Persistence with Domain Replication Abuse
- Part 3 - Miscellaneous Techniques for Achieving Persistence
Want to Continue Getting Inside the Mind of an Attacker?
Learn how threat actors can take advantage of security pitfalls to gain access to Active Directory in our webinar, Getting Inside the Mind of an Attacker: Going Beyond the Exploitation of Software Vulnerabilities.