Episode 86 — Understand Windows Security Infrastructure: Accounts, Groups, Domains, and Trust Relationships
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
-
Narrado por:
-
De:
This episode builds an exam-ready understanding of Windows security infrastructure by focusing on how accounts, groups, and domain relationships determine access and attack paths, which is central to many GSEC scenario questions. You’ll review local versus domain identities, how group membership drives privileges, and why domain architecture and trust relationships can extend both capability and risk across environments. We’ll discuss how attackers exploit weak identity hygiene through credential theft, excessive group membership, shared admin usage, and poorly controlled trusts that enable lateral movement. Scenarios include a workstation compromise that escalates via cached credentials, an admin group that unintentionally includes non-admin users through nesting, and a trust that allows access where segmentation and policy assumed separation. Best practices emphasize least privilege group design, clear administrative tiers, strong authentication for privileged accounts, and logging that supports attribution of high-impact actions, with troubleshooting guidance for interpreting access failures without “fixing” them by granting broad permissions that create persistent risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.