Security expert shows how hackers can bypass Active Directory controls

Summary:A badly implemented Active Directory environment can be a prime target for hackers according to Phil Cracknell, a security consultant at NetSecurity. According to an article, Cracknell took the opportunity at the last Defcon conference to show examples of weakened desktop security due to poor configuration of the directory software.

A badly implemented Active Directory environment can be a prime target for hackers according to Phil Cracknell, a security consultant at NetSecurity. According to an article, Cracknell took the opportunity at the last Defcon conference to show examples of weakened desktop security due to poor configuration of the directory software. For example, he had seen situations where a reboot and removal of the network cable left a PC operating with just the desktop security policies, meaning that restrictions on user access that were written into Active Directory no longer applied.

Topics: Tech Industry

About

Christopher Jablonski is a freelance technology writer. Previously, he held research analyst positions in the IT industry and was the manager of marketing editorial at CBS Interactive. He's been contributing to ZDNet since 2003. Christopher received a bachelor's degree in business administration from the University of Illinois at U... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.