Video On Demand
Skeletons in the IT Closet: Red Team Quick Wins
Mitchell Moser
Peyton Smith
  • Multiple Speakers
  • Mitchell Moser
  • Peyton Smith
Runtime: 28:00
This session provides an overview of commonly observed IT and security misconfigurations that often lead to complete compromise of a victim’s network. A typical red team exercise discovers major security misconfigurations, many of which quickly escalate a red teamer’s privileged access from Domain User to Domain Administrator. We’ll take a trip down IT Closet Lane to discuss some of the common misconfigurations we’ve observed during red team exercises, as well as ways for blue teamers to mitigate these risks. A sample of topics to be covered are: Kerberoasting, compromising service accounts, attacking legacy systems, abusing local administrative privileges and discovering plaintext credentials.

Related Videos

IT Operations When It Comes to Vulnerability Management: It’s Time to STOP and Reassess
Daniel Kahan CrowdStrike 15:30
IT Operations A Use Case for Containment: How One Company Uses the CrowdStrike API to Prevent Data Loss
John Puett TIAA 21:25
IT Operations Case Study: Covert Deployment of Security Tools with CrowdStrike Real Time Response
Michael Getz Swagelok 32:11