IX. Defenses and Bypass – Deception
Understand how Deception can be effective deployed as a defense mechanism in AD.
Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections.
Deploy computer objects and Group objects to deceive an adversary.
Learn how adversaries can identify decoy objects and how defenders can avoid the detection.
PreviousVIII. Defenses and bypass – Architecture and Work Culture ChangesNextX. Defenses and Bypass – PowerShell
Last updated
Was this helpful?