Microsoft Trustworthy Computing recently released several installments in their Targeted Attacks Video Series. While the short videos are largely low-tech, the accompanying documents provide detailed mitigation strategies. Mike Pilkington wrote an excellent review of the 282 page Best Practices for Securing Active Directory document on the SANS Forensics blog. The Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques deck is also worth a read. Interestingly, Microsoft lists common mitigation techniques like “smart cards and multi-factor authentication” and “jump servers” as having only minimal effectiveness.
Targeted Attacks Video Series
Be the first to start the conversation.