5/16 (Thu.) 09:30 - 10:00 4F 4B

Applying Detection Engineering to Attacks Related to Kerberos in Active Directory (AD)

Many enterprises heavily rely on the Active Directory (AD) as the backbone for user and asset management, distributing software updates, and related unified control mechanisms. While AD offers rich and diverse functionalities, it also leads to security risks directly or indirectly due to improper configuration settings by administrators for convenience, among other reasons. Moreover, the internal network structure of large enterprises is relatively complex, making it difficult to promptly detect ongoing attacks in the absence of comprehensive detection mechanisms. This presentation will start with the blue team's perspective, sharing how the core authentication mechanism of domain services - the Kerberos protocol operates, the attack techniques closely related to the Kerberos protocol, and how to detect such attacks in order to prevent attackers from taking over the enterprise domain services effectively and promptly.

Mars Cheng
SPEAKER
Threat Research Manager
TXOne Networks

Dexter Chen
CO-AUTHOR
Dexter Chen
Threat Researcher
TXOne Networks

TOPIC / TRACK
Threat Research Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4B

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Active Directory Security
Blue Team