Detecting advanced threats against Active Directory can be approached in a variety of ways. When looking at Microsoft Advanced Threat Analytics (ATA) compared to STEALTHbits StealthDEFEND for Active Directory they have the same goal and a similar approach, however, there are some key differences.
Microsoft is in a privileged position to build a threat
detection solution to protect against Active Directory attacks. Their end
product is similar to what you would expect from a third-party ven…
Editor’s note: This is the second blog post in a series of blogs for using StealthDEFEND to defend against attacks. Read the first blog “Using StealthDEFEND to Defend Against Password Spraying”.
In this blog post, we’ll be talking about LDAP Reconnaissance and how we can use StealthDEFEND to defend ourselves against this type of attack.
Introduction to LDAP Reconnaissance
When an attacker initially compromises a system on a
network, they may have little to no privileges within the do…
Editors note: This is the 3rd in a series of blog around Active Directory (AD) backup and recovery using Stealthbits, StealthRECOVER. Read the 1st blog, An Introduction to Active Directory Backup and Recovery and the 2nd blog, Active Directory Object Recovery.
The previous post in this series discussed the joys of Active Directory object recovery in an environment without the AD Recycle Bin. If you missed that post, I strongly encourage you to go back and read it as it is arguably the sin…
In this blog post, we’ll be talking
about Password Spraying and how we can use StealthDEFEND to
defend ourselves against this type of attack.
Introduction to Password Spraying
Password
Spraying is a technique attackers leverage to guess the
passwords of accounts by trying a small number of highly common passwords against
a large number of accounts while also staying below an organization’s defined
lockout threshold. This allows an attacker to compromise accounts without a…
When I was a little kid, I knew what I wanted to be when I grew up. No, not an astronaut. Definitely not a doctor or a lawyer. When I grew up, I wanted to be the Product Manager of an Active Directory backup and recovery tool.
Just kidding. I’m pretty sure I wanted to be a Transformer.
Now that I’m grown up older and not a Transformer, I’ve
been tasked with writing a series of blog posts which explain both the backup
and recovery of Active Directory and why you should care about it.&nb…
Looking for a Quest Alternative?
If you’ve been following STEALTHbits and our achievements in the Active Directory Management and Security space, you know we’ve been on a Quest to become your go-to Active Directory security solution provider and Quest Alternative. At STEALTHbits, we believe customers deserve the most innovative solutions and creative capabilities on the market, as well as a partner who will help you make informed decisions about the solutions you’re investing in.
Most imp…
Credentials and data: two common denominators that are present in almost every breach scenario. Unfortunately for all of us, attackers are well aware that you can’t have one without the other.
Getting to the mother lode is simple, really. Step 1: Crack the password. Step 2: Obtain credentials.
And that’s why an organization’s password requirements and policies should always be under intense scrutiny. But herein lies a problem.
What if an organization has “complex” criteria in place, but th…