We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7
1
Assignment_02 Information Security
Muhammad Abdul Basit Reg_No:22F-BSIT-26
---
Explanation: 1. Introduction to Windows Active Directory Basics:
I successfully completed the TryHackMe room "Windows Active Directory Basics." I
now have a solid understanding of core AD components like Domain Controllers, AD Users, Organizational Units, and Group Policy. I can confidently explain their roles and interactions within a domain environment.
2. Active Directory Hardening Techniques:
I researched and implemented various AD hardening techniques, including:
attacks. Least Privilege Access: Restricted user permissions to the minimum necessary to perform their tasks. Secure Network Segmentation: Isolated critical AD resources from the general network.
I also consulted with security experts to gain insights into best practices and potential threats.
3. Attack and Defense: Active Directory Enumeration and Breaching:
Through TryHackMe rooms like "Attacktive Directory," "AD Enumeration," and
"Breaching AD," I gained hands-on experience with common AD attack techniques. I learned how attackers exploit vulnerabilities like weak passwords, default configurations, and misconfigurations.
To defend against these attacks, I researched and implemented the following
strategies:
Network Segmentation: Isolated critical AD resources.
Monitoring and Logging: Implemented robust monitoring and logging to detect suspicious activity. Incident Response Planning: Developed a comprehensive incident response plan to minimize the impact of breaches. 2
4. Case Study on CVE-2022-26923:
I thoroughly analyzed CVE-2022-26923, a critical vulnerability that could allow
remote code execution. I learned about the potential impact of this vulnerability and implemented the recommended patches to mitigate the risk.
5. Applied Skills in Active Directory Defense:
I applied my knowledge of AD defense techniques in a lab environment, simulating
real-world scenarios. I practiced techniques like:
Multi-Factor Authentication (MFA): Enhanced account security by requiring additional
verification steps. User Activity Monitoring: Monitored user behavior to detect anomalies and potential threats. Regular Security Audits: Conducted regular security audits to identify and address vulnerabilities. 3 4 5 6 7