What we're about
Upcoming events (4+)
Ever just look at a directory structure and say to yourself, "Mmm, howdy! That directory sure looks active!" I knew I wasn't the only one. There are so many fine active looking directories out there these days. Sometimes you just want to crawl up into their tree structure and... *inhales deeply* ...sniff out whatever hashes get passed through it. You ever gone "domain admin" with one? Oh, man! You have got to try it. You've not lived until you've gone full Domain Admin with an Active Directory. You won't regret it! Well, unless of course it's *your* domain, that is.
Active Directory is nothing new of course. Most big business have them, and they control access to everything. Which is why they are such tasty targets for attackers. But for something that's so widely used by corporations, it must be pretty locked down, mustn't it? Surely these huge companies who have networks spread across multiple interconnected domains take extra special care when managing access? Right?
Well to help you answer that question, Mike is going to show us some of the techniques an attacker might use to gain access and escalate privileges in an Active Directory domain. From getting your initial user level access to escalating your way up to domain admin. So if you want to keep your AD's innocence intact, show up to the STL2600 + DC314 meetup this Friday. As per usual, doors will be open at 6:00 and the talk starts at 7:00. We'll do our best to stream from this URL: https://meet.jit.si/STL2600Dec