The Remote Malicious Butler Did It!

by Tal Be'ery, Chaim Hoch Sept. 16, 2017 via www.blackhat.com submitted by belen_caty

In our talk, we reveal the "Remote Malicious Butler" attack, which shows how attackers can perform such an attack, remotely, to take a complete control over the remote computer. We will dive into the technical details of the attack including the rogue Domain Controller, the client-side vulnerability and the Kerberos authentication protocol network traffic that ties them. We would explore some other attack avenues, all leveraging on the rogue Domain Controller concept. We would conclude with the analysis of some practical generic detection and prevention methods against rogue Domain Controllers.

https://www.blackhat.com/us-16/briefings.html#the-remote-malicious-butler-did-it