Click any tag below to further narrow down your results
Links
This article explains how attackers exploit identity relationships to breach systems. It introduces Identity Attack Path Management (APM) as a strategy to visualize and prioritize risks based on attacker behavior, helping organizations focus on the most critical vulnerabilities. It also outlines key components and tools for effective APM.
This article discusses the rising threat of identity-based attacks and the limitations of traditional security measures. It emphasizes the need for Attack Path Management (APM) to effectively identify and mitigate numerous hidden attack paths created by complex identity systems.
This article explains the significance of the SDFlags field in LDAP Event ID 1644 logs, focusing on its connection to the nTSecurityDescriptor attribute. It highlights how SDFlags helps bypass permission issues when querying security descriptor data, which is crucial for identifying attack paths in Active Directory.
MSSQLHound is a PowerShell collector designed to integrate Microsoft SQL Server attack paths into BloodHound using OpenGraph. It facilitates the collection of data from MSSQL servers, generating temporary files that can be zipped and uploaded to BloodHound, while also offering various command line options to customize the data collection process. Key features include limitations, future development prospects, and a comprehensive reference for MSSQL nodes and edges.
JamfHound is a Python3 tool that helps users identify attack paths within Jamf Pro tenants by collecting data on object permissions. It generates JSON files compatible with BloodHound for visualizing relationships and control methods, accommodating both cloud and on-site Jamf Pro instances. Users are advised to utilize auditor accounts for data collection and must set up a BloodHound instance to utilize the collected data effectively.