{"id":3858,"date":"2019-10-25T10:31:31","date_gmt":"2019-10-25T17:31:31","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=3858"},"modified":"2020-05-06T14:29:11","modified_gmt":"2020-05-06T21:29:11","slug":"the-backup-operators-guide-to-the-galaxy","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/presentations\/the-backup-operators-guide-to-the-galaxy\/","title":{"rendered":"The Backup Operators Guide to the Galaxy"},"content":{"rendered":"
Backup Operator accounts are ubiquitous and often overlooked by both blue and red teams. These accounts have abusable permissions and are rarely maintained properly. In this webinar, we will examine and demonstrate novel techniques to stealthily compromise Active Directory through the Backup Operator\u2019s account. We will use the Backup Operator account to gain local Admin privilege, establish persistence, and pivot laterally throughout a domain. However, all is not lost in that we can further lockdown our systems and enable auditing measures to deter and detect these attacks<\/p>\n
Presented by Dave Mayer, Head of the Red Team and Senior Security Consultant, InGuardians<\/p>\n