A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Preventing credential theft & lateral movement after initial compromise. - Cameron Moore Bsides Cleveland 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Preventing credential theft & lateral movement after initial compromise.
Cameron Moore

You’ve done the patch work, you have good perimeter defenses, and even application whitelisting, however, an attacker has found themselves on an end-user machine. For most networks, once an attacker has gained access the game is usually over quickly for the blue team. In this session, I will discuss several techniques used by attackers to find additional credentials and laterally move about and how to prevent them. Implementing these changes will slow down escalation and lateral movement and credential theft to provide an opportunity for detection and subsequent response.

Cameron Moore has been working in IT and Information Security for 16 years. He holds a Bachelor’s Degree in Computer Science from Texas State University and is a Certified Information Systems Security Professional. Cameron is passionate about Red Team/Blue Team exercise and security solutions that provide measureable results and believes an organization’s detection and response capabilities are the most important measure of a security program. He has worked in Education, Banking and Healthcare and is currently the IT & Security Manager for Texas RE.


Back to Bsides Cleveland 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast