0% found this document useful (0 votes)
4 views

Assignment02_informayionSecurity

Uploaded by

Abdul Basit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Assignment02_informayionSecurity

Uploaded by

Abdul Basit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1

Assignment_02 Information Security

Muhammad Abdul Basit Reg_No:22F-BSIT-26

---

Explanation:
1. Introduction to Windows Active Directory Basics:

I successfully completed the TryHackMe room "Windows Active Directory Basics." I


now have a solid understanding of core AD components like Domain Controllers, AD
Users, Organizational Units, and Group Policy. I can confidently explain their roles
and interactions within a domain environment.

2. Active Directory Hardening Techniques:

I researched and implemented various AD hardening techniques, including:

 Strong Password Policies: Enforced complex password requirements to mitigate brute-force


attacks.
 Least Privilege Access: Restricted user permissions to the minimum necessary to perform
their tasks.
 Secure Network Segmentation: Isolated critical AD resources from the general network.

I also consulted with security experts to gain insights into best practices and potential
threats.

3. Attack and Defense: Active Directory Enumeration and Breaching:

Through TryHackMe rooms like "Attacktive Directory," "AD Enumeration," and


"Breaching AD," I gained hands-on experience with common AD attack techniques. I
learned how attackers exploit vulnerabilities like weak passwords, default
configurations, and misconfigurations.

To defend against these attacks, I researched and implemented the following


strategies:

 Network Segmentation: Isolated critical AD resources.


 Monitoring and Logging: Implemented robust monitoring and logging to detect suspicious
activity.
 Incident Response Planning: Developed a comprehensive incident response plan to minimize
the impact of breaches.
2

4. Case Study on CVE-2022-26923:

I thoroughly analyzed CVE-2022-26923, a critical vulnerability that could allow


remote code execution. I learned about the potential impact of this vulnerability and
implemented the recommended patches to mitigate the risk.

5. Applied Skills in Active Directory Defense:

I applied my knowledge of AD defense techniques in a lab environment, simulating


real-world scenarios. I practiced techniques like:

 Multi-Factor Authentication (MFA): Enhanced account security by requiring additional


verification steps.
 User Activity Monitoring: Monitored user behavior to detect anomalies and potential
threats.
 Regular Security Audits: Conducted regular security audits to identify and address
vulnerabilities.
3
4
5
6
7

You might also like