Active Directory Security

Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…

  • Home
  • About
  • AD Resources
  • Attack Defense & Detection
  • Contact
  • Mimikatz
  • Presentations
  • Schema Versions
  • Security Resources
  • SPNs
  • Top Posts

Tag: Heap Spray

Jan 31

Microsoft EMET 5.5 Released – Benefits, New Features, Protection, Logging, & GPO Config

  • By Sean Metcalf in Microsoft Security, Mitigation

Microsoft recently released Enhanced Mitigation Experience Toolkit (EMET) version 5.5 (it jumped from 5.2 to 5.5) which includes Windows 10 compatibility and better GPO support (among others). I’ve included information from a variety of Microsoft sources in this post so that others don’t have to search for the data separately. The resources/references are listed at …

Continue reading

  • ASLR, Blocking Untrusted Fonts feature, Bottom-up ASLR, caller checks, CertTrust.xml, DEP, EAF, EAF/EAF+, EAF/EAF+ perf improvements, EMET, EMET Event Logging, EMET5.5, EMET55, EMETWindows10, EMET_Conf, Enhanced Mitigation Experience Toolkit, Enhanced Mitigation Experience Toolkit (EMET) 5.5 Beta User Guide, EnhancedMitigationExperienceToolkit, Export Address Table Access Filtering (EAF), Export Address Table Access Filtering Plus (EAF+), Heap Spray, HideEMET, HideEMETIcon, Load Library, Mandatory ASLR, Memory PRotection, Microsoft EMET Service, MicrosoftEMET, MicrosoftEMET5.5, NULL Page, Popular Software.xml, Recommended Software.xml, SEHOP, Simulate executionflow, stack pivot, Untrusted font mitigation, untrusted fonts, Windows10, \SOFTWARE\Policies\Microsoft\EMET

Recent Posts

  • Mitigating Exchange Permission Paths to Domain Admins in Active Directory
  • From DNSAdmins to Domain Admin, When DNSAdmins is More than Just DNS Administration
  • Domain Controller Print Server + Unconstrained Kerberos Delegation = Pwned Active Directory Forest
  • Black Hat & DEF CON Presentation Slides Posted
  • NolaCon (2018) Active Directory Security Talk Slides Posted

Trimarc Active Directory Security Services

Have concerns about your Active Directory environment? Trimarc helps enterprises improve their security posture.

Find out how... TrimarcSecurity.com

Popular Posts

  • Attack Methods for Gaining Domain Admin Rights in…
  • PowerShell Encoding & Decoding (Base64)
  • Securing Windows Workstations: Developing a Secure Baseline
  • Securing Domain Controllers to Improve Active…
  • The Most Common Active Directory Security Issues and…
  • Finding Passwords in SYSVOL & Exploiting Group…
  • Building an Effective Active Directory Lab…
  • Microsoft Local Administrator Password Solution (LAPS)
  • Detecting Offensive PowerShell Attack Tools
  • Kerberos & KRBTGT: Active Directory’s…

Categories

  • ActiveDirectorySecurity
  • Apple Security
  • Cloud Security
  • Continuing Education
  • Entertainment
  • Exploit
  • Hacking
  • Hardware Security
  • Hypervisor Security
  • Linux/Unix Security
  • Malware
  • Microsoft Security
  • Mitigation
  • Network/System Security
  • PowerShell
  • RealWorld
  • Security
  • Security Conference Presentation/Video
  • Security Recommendation
  • Technical Article
  • Technical Reading
  • Technical Reference
  • TheCloud
  • Vulnerability

Tags

Active Directory ActiveDirectory ActiveDirectoryAttack ActiveDirectorySecurity Active Directory Security ADReading ADSecurity DCSync DEFCON DomainController EMET5 GoldenTicket HyperV Invoke-Mimikatz KB3011780 KDC Kerberos KerberosHacking KRBTGT LAPS LSASS MCM MicrosoftEMET MicrosoftWindows mimikatz MS14068 PassTheHash PowerShell PowerShellCode PowerShellHacking PowerShellv5 PowerSploit Presentation Security SIDHistory SilverTicket SneakyADPersistence SYSVOL TGS TGT Windows7 Windows10 WindowsServer2008R2 WindowsServer2012 WindowsServer2012R2

Copyright

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned. Content Ownership: All content posted here is intellectual work and under the current law, the poster owns the copyright of the article. Terms of Use Copyright © 2011 - 2017.

Content Disclaimer: This blog and its contents are provided "AS IS" with no warranties, and they confer no rights. Script samples are provided for informational purposes only and no guarantee is provided as to functionality or suitability. The views shared on this blog reflect those of the authors and do not represent the views of any companies mentioned.

Made with by Graphene Themes.