Security News > 2021 > July > SpecterOps BloodHound Enterprise enables organizations to eliminate critical AD attack paths

Designed to help organizations proactively and continuously identify, manage and remediate millions of AD Attack Paths, BloodHound Enterprise gives IT Ops and SecOps professionals the tools needed to dramatically and measurably improve AD security posture with minimal effort.
As a largely unseen, unmanaged and growing problem for enterprises, AD Attack Paths are used by attackers to gain control of systems and data, impersonate users, abuse legitimate access to non-AD systems and much more.
Until BloodHound Enterprise there has not been a practical defensive tool that identifies and quantifies AD choke points, eliminating Active Directory as an attacker's easiest, most reliable and biggest payoff target.
"In contrast, BloodHound Enterprise continuously identifies the critical Attack Path 'choke points' for elimination, visually illustrates the Attack Paths for contextual understanding, and prioritizes which Attack Paths to eliminate based on actual risk."
Attack Paths are chains of abusable privileges and user behaviors that create direct and indirect connections between computers and users within AD. Once an attacker compromises a system or device, they can use the privileges of those users to compromise other systems or devices until they reach their final objective.
AD controls which users have access to which systems, so configuring AD correctly can close off these Attack Paths - if the organization is aware they exist.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/y-aVoRwJh3A/
Related news
- CISA tags critical Ivanti EPM flaws as actively exploited in attacks (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- Critical RCE flaw in Apache Tomcat actively exploited in attacks (source)
- Critical GitHub Attack (source)
- Critical Cisco Smart Licensing Utility flaws now exploited in attacks (source)
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utility (source)
- Critical auth bypass bug in CrushFTP now exploited in attacks (source)
- SAP fixes critical Netweaver flaw exploited in attacks (source)