Relevant Course: https://www.sans.org/sec599
Presented by: Michel Coene and Didier Stevens
Follow: / didierstevens
Follow: / coenemichel
In order to interact with a real domain controller, Mimikatz can spoof a Windows domain controller, and read information from or write information to active directory.
Mimikatz's DCSync command is used to read information: typically, it is used to dump credentials from active directory. And the DCShadow command is used to write information: for example, modify the primary group of an account to a group with higher privileges.
The use of these Mimikatz commands results in active directory replication network traffic between the compromised machine and domain controllers.
In this webinar, we will show you what this network traffic looks like, and how you can detect it. IDS rules to detect DCSync and DCShadow network traffic will be developed. Finally, more generic detection rules will also be covered.
Смотрите видео Detecting DCSync and DCShadow Network Traffic онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь SANS Offensive Operations 16 Ноябрь 2021, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 3,61 раз и оно понравилось 8 людям.