[FR] Active Directory security: 8 (very) low hanging fruits and how to smash those attack paths
<p><a id=ad></a> </p>
<h3>Abstract</h3>
<p>Pentester or attacker often exploit the same obvious vulnerabilities in Active directory. Come learn how to exploit and mitigate them.</p>
<h3>Storyline</h3>
<p>Welcome in PacFirm, the most insecure network ever, we have a very large Active Directory environment and we do no security at all. For now, no ghost has ever hacked our corporate network (at least we hope) but our new CISO requires us to perform a security assessment.</p>
<p><strong>Your mission, should you choose to accept it, is to evaluate our security level and fix the issues.</strong></p>
<h3>Detailed content</h3>
<p>In this fully hands-on workshop, we’ll guide you through 8 of the lowest hanging fruits weaknesses that we witnessed during numerous penetration tests. You’ll learn how to:</p>
<ul>
<li>Spot passwords inside user descriptions</li>
<li>Find passwords on shared folders</li>
<li>Spray passwords over accounts</li>
<li>Quickly detect obsolete workstations and servers</li>
<li>Get free password hashes by kerberoasting</li>
<li>Pivot from machine to machine by reusing local credentials</li>
<li>Spot machines where Domain Admins are connected</li>
<li>Retrieve Domain Admins credentials in memory</li>
</ul>
<p>Crackmapexec, Powerview, Rubeus, Mimikatz will be your best friends during this workshop.</p>
<p><strong>Hand-on exercises</strong> will be performed on our lab environment with more than twenty virtual machines. For each attack, we will also discuss about mitigation techniques.</p>
<h3>Target audience & Prerequisites</h3>
<p>This training is aimed at sysadmins or security professionals willing to start with Active Directory security and hands-on sessions. There is no specific requirement for attendees except a basic IS and infosec culture.</p>
<p><strong>All attendees will need to bring a laptop capable of running virtual machines (4GB of RAM is a minimum) and an up-to-date RDP client.</strong> Each attendee will be given a USB key with a Windows virtual machine with the necessary pentesting tools to perform the lab sessions.</p>
<h4>À propos de Rémi Escourrou <a href="https://twitter.com/remiescourrou">@remiescourrou</a> & Nicolas Debresse <a href="https://twitter.com/nicolas_dbresse">@nicolas_dbresse</a></h4>
<p>Rémi Escourrou and Nicolas Daubresse are security consultant at Wavestone. For 3 years, they have been developing their skills as a pentester of IT infrastructure and more specifically on Active Directory environment. They are also involved in the CERT-W as First Responder.</p>