21.11.2015 Views

dissection of a Cyber- Espionage attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The target: the moat without water<br />

How to develop a good network segmentation and be breached<br />

The environment is a Micros<strong>of</strong>t AD Forest with a pyramidal structure.<br />

#RSAC<br />

• The root AD trusts several subdomains each with<br />

its proper set <strong>of</strong> AD servers.<br />

• The forest is regulated with different level <strong>of</strong> trust.<br />

• The «Secret» and «NATO» networks are physically<br />

separated entities were people can access only<br />

through dedicated machines.<br />

• Under no circumstances a user from standard AD<br />

structure can access Secret networks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!