AD Attack Paths: How Object-level Permissions Lead to Inadvertent Access

Logo
Presented by

Jeff Warren, GM-Products, Stealthbits now part of Netwrix

About this talk

The overwhelming majority of organizations worldwide leverage Active Directory (AD) as their central hub of authentication and authorization. It literally holds the keys to the kingdom, and because of this, it is a central target for threat actors to leverage in order to infiltrate your organization. Unfortunately, native tools and views into AD and AD object permissions lack the ability to scale effectively, even in smaller environments. Without this insight, your organization is vulnerable to a variety of AD attack paths and inadvertent access that can lead to serious data breaches. Join Jeff Warren, GM, Stealthbits Technologies, as he reviews: • How attackers can exploit weak AD permissioning • Weak Password Identification and Reset Capabilities • Unconstrained Delegation Permissions
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (76)
Subscribers (7120)
Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. More than 13,500 organizations across 100+ countries rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity, and infrastructure. By reducing the cybersecurity burden with Netwrix, organizations concentrate on advancing their cause while reducing cyber risk. For more information, visit www.netwrix.com