- This session has passed.
Gaining Privileged Access on Windows Networks
July 13 @ 2:10 pm - 3:05 pm
Since nearly all organizations run Microsoft Active Directory (AD), a goal of most internal penetration tests is to gain access to a Domain Administrator account. Even in an environment up to date with patches and anti-virus, testers can gain Domain Administrator access using real-world attack methods. To help explain the mistakes and weaknesses that allow for privileged access, Sikich will demonstrate tools and techniques used by attackers to gain a foothold in a Microsoft AD environment. This talk will reinforce the fact that many organizations who believe they are well secured often leave gaps that can allow for breaches of privileged accounts; demonstrate the vulnerabilities, tools and techniques that can provide attackers with administrative access; and share best practices that can protect against these types of attacks. The presentation format will consist almost entirely of penetration testing tactic demonstrations using tools within Kali Linux in a virtual lab environment.
After attending this talk, students and IT professionals in, or getting into, IT or defensive IT security roles will be able to better identify and act upon network weaknesses that can provide unauthorized access to administrative accounts on networks. These attendees will also likely learn additional tools and techniques that they can apply during penetration tests. Executive leaders, IT leaders and other decision makers will gain a better understanding of how breaches of administrative accounts happen, will have better insight into areas where IT security resources should be focused, and will take away specific best practices they can assess within their own organization to gauge the strength of their security posture.