Abstract
Many of today’s enterprises use Microsoft Active Directory (AD) either as their enterprise directory or as the network OS (NOS) directory for their Windows infrastructure. AD has become an important asset in most enterprises, and valuable things must be protected accordingly. This paper provides examples of attacks against Active Directory and shows how an enterprise directory can be protected against them. The attacks addressed in this paper include password cracking-, elevation of privilege- and denial-of-service-based attacks. The main goal of this paper is to show AD users the urgent need for taking a multi-pronged approach toward locking down and securing AD.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IETF website, “Public Key Cryptography for Initial Authentication in Kerberos”: http://www.ietf.org/proceedings/O3mar/I-D/draft-ietf-cat-kerberos-pk-init-16.txt, 2003
Microsoft Knowledge Base website, article “MSO2-001: Forged SID could result in elevated privileges in Windows 2000”: http://support.microsoft.coml?kbid=2892432002, 2002
Microsoft Knowledge Base website, article “How To Use Visual Basic Script to Clear SidHistory”: http://support.microsoft.com/?kbid=295758, 2004
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
De Ciercq, J. (2006). Deflecting Active Directory Attacks. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_18
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)