{"id":4019,"date":"2018-08-12T16:27:11","date_gmt":"2018-08-12T20:27:11","guid":{"rendered":"https:\/\/adsecurity.org\/?p=4019"},"modified":"2018-08-12T16:32:27","modified_gmt":"2018-08-12T20:32:27","slug":"black-hat-def-con-presentation-slides-posted","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=4019","title":{"rendered":"Black Hat &#038; DEF CON Presentation Slides Posted"},"content":{"rendered":"<p>I just uploaded the slides from my Black Hat &amp; DEF CON talks from the past week in Vegas.\u00a0 They are a bit different with the BH talk more Blue (defensive) and the DC talk mostly Red (Offensive) in focus. Also note that the only real overlap in content is the MFA &amp; password vault sections and those were updated in my DEF CON talk to focus on the attack aspect.<\/p>\n<p>An important note: The methods I show are real and work well in many real-world customer deployments. The issues with MFA and password vaults I highlight are often deployment issues and not necessarily vendor best practices. With that noted, I have seen enterprise password vaults deployed with poor security so often that I don&#8217;t think customers are very familiar with the vendor security best practices.<\/p>\n<p>Slides are in the <a href=\"https:\/\/adsecurity.org\/?page_id=1352\">Presentations section<\/a>.<\/p>\n<p><strong>Black Hat USA 2018 Talk:\u00a0 &#8220;From Workstation to Domain Admin: Why Secure Administration isn&#8217;t Secure and How to Fix it&#8221;<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-4023\" src=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/BH2018-TitleSlide.png\" alt=\"\" width=\"541\" height=\"303\" srcset=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/BH2018-TitleSlide.png 1441w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/BH2018-TitleSlide-300x168.png 300w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/BH2018-TitleSlide-768x429.png 768w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/BH2018-TitleSlide-1024x572.png 1024w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><br \/>\nThis talk walks the audience through how AD administration has evolved over time with newer, more &#8220;secure&#8221; methods and the potential ways to exploit modern AD administration. I explore some methods to exploit current implementation weaknesses in many deployments of multi-factor authentication (MFA) and enterprise password vaults. The latter third of the talk dives into the best defenses and how to employ and deploy them appropriately.<br \/>\n[<a href=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/us-18-Metcalf-From-Workstation-To-Domain-Admin-Why-Secure-Administration-Isnt-Secure-Final.pdf\">Slides<\/a>]<\/p>\n<p><span style=\"text-decoration: underline;\">Black Hat Talk Agenda:<\/span><\/p>\n<ul>\n<li>Current State<\/li>\n<li>Evolution of Administration<\/li>\n<li>Exploiting Typical Administration<\/li>\n<li>Common Methods of Protecting Admins (&amp; bypassing them)<\/li>\n<li>MFA<\/li>\n<li>Enterprise Password Vaults<\/li>\n<li>Admin Forest<\/li>\n<li>Building the Best Defenses<\/li>\n<\/ul>\n<p><strong>DEF CON 26 Talk: &#8220;Exploiting Active Directory Administrator Insecurities&#8221;<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-4022\" src=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/DC26-TitleSlide.png\" alt=\"\" width=\"526\" height=\"294\" srcset=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/DC26-TitleSlide.png 1557w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/DC26-TitleSlide-300x167.png 300w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/DC26-TitleSlide-768x429.png 768w, https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/DC26-TitleSlide-1024x572.png 1024w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><br \/>\nThis talk repeats the slide concepts from my Black Hat talk specific to exploiting current implementation weaknesses in many deployments of multi-factor authentication (MFA) and enterprise password vaults.\u00a0 The talk adds in some challenges in properly discovering AD admins and some additional methods of exploiting current AD environments. I also cover how in many environments it may be possible to compromise a Read-Only Domain Controller to compromise the AD forest. This talk also includes a special, new sneaky AD persistence method which only the DEF CON audience was privy to (not in the slides, at least not directly). I will post a blog article as time allows. \ud83d\ude42<br \/>\n[<a href=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2018\/08\/2018-DEFCON-ExploitingADAdministratorInsecurities-Metcalf.pdf\">Slides<\/a>]<\/p>\n<p><span style=\"text-decoration: underline;\">DEF CON Talk Agenda:<\/span><\/p>\n<ul>\n<li>Evolution of Admin Discovery<\/li>\n<li>Exploiting Typical Administration<\/li>\n<li>Multi-Factor Authentication (MFA)<\/li>\n<li>Password Vaults<\/li>\n<li>Admin Forest<\/li>\n<li>Attacking RODCs<\/li>\n<\/ul>\n<p>Thank you all for your support and your kind words!<br \/>\n&#8211; Sean<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I just uploaded the slides from my Black Hat &amp; DEF CON talks from the past week in Vegas.\u00a0 They are a bit different with the BH talk more Blue (defensive) and the DC talk mostly Red (Offensive) in focus. Also note that the only real overlap in content is the MFA &amp; password vault &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=4019\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[234,930],"tags":[],"class_list":["post-4019","post","type-post","status-publish","format-standard","hentry","category-security-conference-presentationvideo","category-vulnerability","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4019"}],"version-history":[{"count":3,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4019\/revisions"}],"predecessor-version":[{"id":4024,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4019\/revisions\/4024"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}