STEALTHbits Cyber Kill Chain Attack Catalog: Active Directory Attacks and More

STEALTHbits Cyber Kill Chain Attack Catalog: Active Directory Attacks and More

Cyber Attack Reference Guide for Security Practitioners

For over a year now, we’ve been documenting all the most common and clever techniques attackers have developed to compromise Active Directory credentials on their way to complete domain dominance.  Frustratingly, but not surprisingly, the quantity of attack methods to choose from and the frequency of attack prevalence have only risen over the past 12 months, which got us thinking…

How – besides continuing to provide cutting edge solutions for credential and data security – can we here at STEALTHbits help our customers understand and articulate the nature and severity of these attacks to their businesses stakeholders, as well as craft a sound strategy for what to do about them?

We can all agree that attacks against critical infrastructure like Active Directory and Windows operating systems have been well documented over the years, but perhaps haven’t always been communicated clearly to or understood by the cybersecurity community as a whole.  As a Security Practitioner with so many different attack vectors to worry about these days, who’s got the time to be an expert on anything, let alone everything?

Your Guide for Active Directory Attacks and More

To bridge the gap, we built the STEALTHbits Cyber Kill Chain Attack Catalog. Designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise credentials and data, we want this site to be your go-to resource for quickly and easily wrapping your head around otherwise complex concepts aligning to cyber-attacks.

In this initial launch, we’ve documented ten (10) threats to get you started.  Not only have we broken down each attack into simple descriptions and steps, but we’ve also provided guidance on what you can do about them and included links to other great sources of information to help guide you to the best resources out there.

Top 10 Active Directory Threats

AdminSDHolder Modification
DCShadow
DCSync
Golden Ticket
Kerberoasting
LDAP Reconnaissance
Ntds.dit Password Extraction
Pass-the-Hash
Password Spraying
Plaintext Password Extraction through Group Policy Preferences

Check back soon or sign up to be alerted when the site is live.  We think you’re going to love this new resource!

Adam Laub is the Senior Vice President of Product Marketing at STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism.

Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, and Operational Management roles.

Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Start a Free StealthAUDIT® Trial!

No risk. No obligation.