{"id":2308,"date":"2020-01-20T10:32:03","date_gmt":"2020-01-20T08:32:03","guid":{"rendered":"https:\/\/www.identitycosmos.com\/?p=2308"},"modified":"2020-01-20T10:32:03","modified_gmt":"2020-01-20T08:32:03","slug":"tres-bonne-video-sur-lusage-dactive-directory-pendant-des-attaques-organisees","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2020\/01\/20\/tres-bonne-video-sur-lusage-dactive-directory-pendant-des-attaques-organisees\/","title":{"rendered":"Tr\u00e8s bonne vid\u00e9o sur l&#8217;usage d&#8217;Active Directory pendant des attaques organis\u00e9es"},"content":{"rendered":"\n<p>Si vous vous int\u00e9ressez aux principes d&#8217;attaques et d&#8217;exploit, vous trouverez dans cette vid\u00e9o des informations importantes vous permettant de mieux comprendre comment les groupes cyber-criminels utilisent Active Directory pour se r\u00e9pandre dans les organisations, et bien sur quelques trucs et astuces pour mieux vous prot\u00e9gez.<\/p>\n\n\n\n<p>Le pr\u00e9sentateur prend en exemple le fonctionnement du malware Ryuk et explique notamment la notion de DomainGrabber, permettant de mieux appr\u00e9hender comment la premi\u00e8re partie d&#8217;un malware est en fait un code latent r\u00e9alisant la reconnaissance &#8211; l&#8217;infection par Ryuk n&#8217;\u00e9tant que l&#8217;\u00e9tape finale.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CONFidence 2019: &quot;Inside Cybercrime Groups Harvesting Active Directory for Fun...&quot; - Vitali Kremez\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/u1XvMcwdvgI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Si vous vous int\u00e9ressez aux principes d&#8217;attaques et d&#8217;exploit, vous trouverez dans cette vid\u00e9o des informations importantes vous permettant de mieux comprendre comment les groupes cyber-criminels utilisent Active Directory pour se r\u00e9pandre dans les organisations, et bien sur quelques trucs et astuces pour mieux vous prot\u00e9gez. Le pr\u00e9sentateur prend en exemple le fonctionnement du malware [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[14,77,78,87,142,197,206,236],"class_list":["post-2308","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-active-directory","tag-cybercrime","tag-cybersecurity","tag-emotet","tag-malware","tag-ransoware","tag-ryuk","tag-trickbot"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=2308"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2308\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=2308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=2308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=2308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}