Attackers want Active Directory privileges. Here’s how to stop them
Reading Time: < 1 | Published: November 2, 2020 in Attivo News
A growing number of threat actors use advanced persistent threat (APT) tactics to progress their attacks. More and more target Active Directory (AD), domain controllers, and flaws in Kerberos tickets to find weaknesses, steal credentials, and escalate privileges. By gathering this information, attackers can gain what they need to establish a foothold, move laterally through the network without detection, and secure administrator privileges.
More than 90 percent of businesses use AD as their identity management system, which serves as a master directory and the means to control access to enterprise services. Tools such as Bloodhound, Mimikatz, and Metasploit are useful for legitimate security research. However, they have also made it much easier for attackers to engage in credential-dumping, recovering plaintext or hashed passwords from systems, gaining Domain Admin privileges, and securing the “blueprint” of the network.
Learn how to protect Active Directory with deception and denial in the complete SC Magazine article by Carolyn Crandall.
Share on:
Continue Reading
Free Active Directory Assessment
Get Visibility Into Privilege And Service Account Exposure
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.
Try Our Endpoint Detection Net (EDN) for Free
FAST AND EASY
Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.
Newsletter Signup
ADSecure 90-Day Free Trial
GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY
- Hide and deny access to AD objects
- Get alerted on unauthorized queries
- Attack details easily viewable in dashboard
- Your data remains on-premise