Cyber Attack Reference Guide for Security Practitioners
For over a year now, we’ve been documenting all the most common and clever techniques attackers have developed to compromise Active Directory credentials on their way to complete domain dominance. Frustratingly, but not surprisingly, the quantity of attack methods to choose from and the frequency of attack prevalence have only risen over the past 12 months, which got us thinking…
How – besides continuing to provide cutting edge solutions for credential and data security – can we here at STEALTHbits help our customers understand and articulate the nature and severity of these attacks to their businesses stakeholders, as well as craft a sound strategy for what to do about them?
We can all agree that attacks against critical infrastructure like Active Directory and Windows operating systems have been well documented over the years, but perhaps haven’t always been communicated clearly to or understood by the cybersecurity community as a whole. As a Security Practitioner with so many different attack vectors to worry about these days, who’s got the time to be an expert on anything, let alone everything?
Your Guide for Active Directory Attacks and More
To bridge the gap, we built the STEALTHbits Cyber Kill Chain Attack Catalog. Designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise credentials and data, we want this site to be your go-to resource for quickly and easily wrapping your head around otherwise complex concepts aligning to cyber-attacks.
In this initial launch, we’ve documented ten (10) threats to get you started. Not only have we broken down each attack into simple descriptions and steps, but we’ve also provided guidance on what you can do about them and included links to other great sources of information to help guide you to the best resources out there.
Top 10 Active Directory Threats
Don’t miss a post! Subscribe to The Insider Threat Security Blog here:
Adam Laub is the Senior Vice President of Product Management at STEALTHbits Technologies. He is responsible for setting product strategy, defining future roadmap, driving strategic sales engagements, supporting demand generation activities, enabling the sales organization and all aspects of product evangelism.
Since joining STEALTHbits in 2005, Adam has held multiple positions within the organization, including Sales, Marketing, and Operational Management roles.
Adam holds a Bachelor of Science degree in Business Administration from Susquehanna University, Selinsgrove, PA.