For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Pass the Hash Deconstructed: Protecting Against Malicious Privilege Elevation in Active Directory

Live Webcast: Pass the Hash Deconstructed: Protecting Against Malicious Privilege Elevation in Active Directory
On Demand
  • Recorded Date:Oct. 22, 2020
  • Event:On Demand
Live Webcast: Pass the Hash Deconstructed: Protecting Against Malicious Privilege Elevation in Active Directory

Active Directory is the most widely used directory. More than 90 percent of Fortune 1000 organizations have it deployed and managing user access. AD touches nearly everything. If an attacker gets control of it, they can damage, steal, sell or ransom your data.

As the most widely used on-premises directory, Active Directory (AD) represents the ultimate target for hackers. Persistence, lateral movement, and resource access usually involve some form of breaking into AD and then elevating privileges.  The phrase “get the DA” (Domain Admin) being common amongst the attacker community. Whether it’s a Pass the Hash attack, cracking Kerberos tickets, or taking advantage of clear text passwords, once the bad guy has credentials, it’s generally game over for the organization.

So, just how big a problem is this, and what should you do about it?

View this on-demand webcast in which presenters Nick Cavalancia, Microsoft Cloud and Datacenter MVP, and One Identity’s Dan Conrad, technical strategist, discuss AD security concerns, highlight common attack methods and what you can do to address both.

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.