X
Business

Security expert shows how hackers can bypass Active Directory controls

A badly implemented Active Directory environment can be a prime target for hackers according to Phil Cracknell, a security consultant at NetSecurity. According to an article, Cracknell took the opportunity at the last Defcon conference to show examples of weakened desktop security due to poor configuration of the directory software.
Written by Chris Jablonski, Inactive

A badly implemented Active Directory environment can be a prime target for hackers according to Phil Cracknell, a security consultant at NetSecurity. According to an article, Cracknell took the opportunity at the last Defcon conference to show examples of weakened desktop security due to poor configuration of the directory software. For example, he had seen situations where a reboot and removal of the network cable left a PC operating with just the desktop security policies, meaning that restrictions on user access that were written into Active Directory no longer applied.

Editorial standards