Red Team Revenge Attacking Microsoft ATA Nikhil Mittal

Subscribers:
6,440
Published on ● Video Link: https://www.youtube.com/watch?v=35XknWCJJss



Duration: 52:47
9 views
1


Microsoft Advanced Threat Analytics (ATA) is a defence platform which reads information from multiple sources like traffic for certain protocols to the Domain Controller, Windows Event Logs and SIEM events. The information collected is used to detect Reconnaissance, Credentials replay, Lateral movement, Persistence attacks etc. Well known attacks like Pass-the-Hash, Pass-the-Ticket, Overpass-the-Hash, Golden Ticket, Directory services replication, Brute-force, Skeleton key etc. can be detected using ATA. Whenever communication to a Domain Controller is performed using protocols like Kerberos, NTLM, RPC, DNS, LDAP etc., ATA will parse that traffic for gathering information about not only possible attacks but user behaviour as well. It slowly builds an organizational graph and can detect deviations from normal behaviour. This talk focuses on identifying and attacking ATA installations. Can ATA be attacked to suppress alerts? How noisy is it to attack ATA? How can alerts related to a particular identity (user and computer) be exempted? How can ATA be controlled and crippled remotely? The talk will be full of live demonstrations


Presenters:
Nikhil Mittal

44 con 2017
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
theft
system
firewall
communication
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
read team
microsoft
ata
Nikhil Mittal