Pass the Hash Deconstructed: Protecting Against Malicious Privilege Elevation in Active Directory
Date: Thursday, October 22nd at 11am PDT / 2pm EDT
As the most widely used on-premises directory, Active Directory (AD) represents the ultimate target for hackers. Persistence, lateral movement, and resource access usually involve some form of breaking into AD and then elevating privileges. The phrase “get the DA” (Domain Admin) being common amongst the attacker community. Whether it’s a Pass the Hash attack, cracking Kerberos tickets, or taking advantage of clear text passwords, once the bad guy has credentials, it’s generally game over for the organization.
So, just how big a problem is this, and what should you do about it?
Join Nick Cavalancia, Microsoft Cloud and Datacenter MVP, along with Dan Conrad, Technical Strategist from One Identity, as they discuss common attack methods used to attain elevated privileges via Active Directory and ways to thwart malicious efforts using a live simulation of a Pass the Hash attack as an example.
Dan will also demonstrate how solutions from One Identity can provide Just-In-Time Provisioning to stop attacks like these by allowing privileges to be assigned only at the time of a credential check-out and removed at check-in.
Time: 11:00am PT