Security News > 2021 > July > SpecterOps BloodHound Enterprise enables organizations to eliminate critical AD attack paths
Designed to help organizations proactively and continuously identify, manage and remediate millions of AD Attack Paths, BloodHound Enterprise gives IT Ops and SecOps professionals the tools needed to dramatically and measurably improve AD security posture with minimal effort.
As a largely unseen, unmanaged and growing problem for enterprises, AD Attack Paths are used by attackers to gain control of systems and data, impersonate users, abuse legitimate access to non-AD systems and much more.
Until BloodHound Enterprise there has not been a practical defensive tool that identifies and quantifies AD choke points, eliminating Active Directory as an attacker's easiest, most reliable and biggest payoff target.
"In contrast, BloodHound Enterprise continuously identifies the critical Attack Path 'choke points' for elimination, visually illustrates the Attack Paths for contextual understanding, and prioritizes which Attack Paths to eliminate based on actual risk."
Attack Paths are chains of abusable privileges and user behaviors that create direct and indirect connections between computers and users within AD. Once an attacker compromises a system or device, they can use the privileges of those users to compromise other systems or devices until they reach their final objective.
AD controls which users have access to which systems, so configuring AD correctly can close off these Attack Paths - if the organization is aware they exist.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/y-aVoRwJh3A/
Related news
- CISA says critical Fortinet RCE flaw now exploited in attacks (source)
- Fortinet warns of new critical FortiManager flaw used in zero-day attacks (source)
- FortiManager critical vulnerability under active attack (source)
- CISA warns of critical Palo Alto Networks bug exploited in attacks (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Critical bug in EoL D-Link NAS devices now exploited in attacks (source)
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks (source)
- Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks (source)