Active Directory and Azure are the heart of identity and access management for many companies and their ubiquity within information systems makes them prime targets during red team engagements. While their security is vastely explored within the public space, mature environments may prove more challenging for operators, requiring advanced exploitation techniques to lead the intrusion to its success. With a focus on hands-on practice (70%), this training will deepen your intrusion skills on modern and mature organizations, with discretion in mind. Each student will access an individual and realistic corporate network to study advanced techniques of reconnaissance, lateral movements, elevation of privileges, extraction of secrets and persistence, within Active Directory and Azure.
SYNACKTIV
@hugow_vincent
Hugo Vincent is a security researcher at Synacktiv, he performs vulnerability research and penetration tests of enterprise networks and cloud environments. His passion lies in exploring and mastering new exploitation techniques, particularly in Active Directory and cloud environments.
He presented previously at SSTIC, THCon and Pass-the-Salt.
SYNACKTIV
@tiyeuse
Wilfried Bécard is a hacker and researcher working at Synacktiv. With a particular interest in Active Directory and Azure exploitation, his passion lies in uncovering new techniques to enhance cybersecurity in these areas. Constantly experimenting, testing, and collaborating with the security community, he aims at constantly improving his knowledge in these fields.
To apply theoretical notions, each participant will be granted access to an individual lab of 20+ machines and multiple network zones, simulating a mature corporate environment with several Active Directory forests and hybrid connection to Azure. Built from our own red team experience, this lab offers a complete scenario from external unauthenticated access to the full compromise of the organization, using techniques such as credentials digging on sharepoints, pivoting to and from Azure through browser dumping, intune abuses or ADFS compromise, ADCS exploitation, advanced kerberos delegation and so on. Finally, practical exploitation will always be with discretion in mind to defeat common monitoring capabilities.
Fundamentals
Recognition and first authenticated actions
Lateral movements
Privilege escalation
Local
Domain
Secrets extraction
Persistence
This training is intended for red teamers who already have a good knowledge of
Active Directory and fundamentals in Azure. Good networking and Unix knowledge
is also recommended.