New Blog Post | Attacking Active Directory as a Red Teamer or as an Attacker

%3CLINGO-SUB%20id%3D%22lingo-sub-2757862%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Attacking%20Active%20Directory%20as%20a%20Red%20Teamer%20or%20as%20an%20Attacker%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2757862%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1631819924602.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F310855i37B2B7E8BA94371A%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1631819924602.png%22%20alt%3D%22JasonCohen1892_0-1631819924602.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fattacking-active-directory-as-a-red-teamer-or-as-an-attacker%2Fba-p%2F2676707%22%20target%3D%22_blank%22%3EAttacking%20Active%20Directory%20as%20a%20Red%20Teamer%20or%20as%20an%20attacker%20(microsoft.com)%3C%2FA%3E%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdefender-for-identity%2Fwhat-is%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eis%20a%20cloud-based%20security%20solution%20that%20leverages%20your%20on-premises%20Active%20Directory%20signals%20to%20identify%2C%20detect%2C%20and%20investigate%20advanced%20threats%2C%20compromised%20identities%2C%20and%20malicious%20insider%20actions%20directed%20at%20your%20organization.%20Defender%20for%20Identity%20also%26nbsp%3Bprotects%20Active%20Directory%20Federation%20Services%20(AD%20FS)%20in%20your%20environment%20by%20detecting%20advanced%20threats%20and%20providing%20visibility%20into%20authentication%20events%20generated%20by%20AD%20FS.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20default%20Active%20Directory%20authentication%20protocol%20is%20Kerberos%2C%20an%20authentication%20protocol%20based%20on%20tickets%2C%20and%20is%20known%20for%20being%20the%20target%20method%20of%20many%20attacks.%20Kerberos%20is%20an%20authentication%20protocol%20developed%20by%20MIT%20and%20adopted%20by%20Microsoft%20since%20Windows%202000.%20Kerberos%20can%20also%20be%20complicated%20and%20as%20a%20result%2C%20hard%20to%20secure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20data-unlink%3D%22true%22%3EThis%20blog%20post%20will%20go%20through%20attacking%20Active%20Directory%20as%20a%20Red%20Teamer%20and%20having%20Defender%20for%20Identity%26nbsp%3Bin%20place%20to%20protect%20this%20high-value%20information.%20What%20do%20I%20have%20to%20consider%20before%20I%20make%20my%20next%20move%3F%20Let's%20find%20out%20how%20Defender%20for%20Identity%20makes%20my%20job%20so%20difficult.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2757862%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Identity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1631819924602.png

Attacking Active Directory as a Red Teamer or as an attacker (microsoft.com)

Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. Defender for Identity also protects Active Directory Federation Services (AD FS) in your environment by detecting advanced threats and providing visibility into authentication events generated by AD FS.

 

The default Active Directory authentication protocol is Kerberos, an authentication protocol based on tickets, and is known for being the target method of many attacks. Kerberos is an authentication protocol developed by MIT and adopted by Microsoft since Windows 2000. Kerberos can also be complicated and as a result, hard to secure.

 

This blog post will go through attacking Active Directory as a Red Teamer and having Defender for Identity in place to protect this high-value information. What do I have to consider before I make my next move? Let's find out how Defender for Identity makes my job so difficult.

0 Replies